You can use Ropper to display information about binary files in different file formats and search for gadgets to build rop chains for various architectures (x86/X86_64, ARM/ARM64, MIPS/MIPS64, PowerPC/PowerPC64, SPARC64). Ropper utilizes the Capstone Framework for disassembly. To install, you can use pip to install Capstone, filebytes, and optionally Keystone. Ropper can be executed after installation using 'python setup.py install' or 'pip install ropper'. It also offers a semantic search command for searching gadgets.
Identifies 137 malicious npm packages and gathers system information to a remote server.
PLASMA is an interactive disassembler with support for various architectures and formats, offering a Python API for scripting.
A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz
Interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.