Skip to content
View user1342's full-sized avatar
Block or Report

Block or report user1342

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
user1342/README.md

πŸ› οΈ Binary Analysis Automation | Checkout some of my tools for accelerating reverse engineering, vulnerability research, and binary analysis using automation and machine learning.

🧐 Monocle - Large Language Model For Binary Analysis Search.

πŸ₯’ Tweezer - A binary analysis tool for identifying unknown function names, using a word-2-vec model.

πŸ‡ AutoCorpus - LLM backed tooling for automatically generating corpus files for fuzzing.

πŸ“ Just Another Differ - A diffing tool for binary files when comparing obfuscated and changed binary names between versions.


πŸ“± Android Reverse Engineering | Checkout some of my tools for interacting with, emulating, testing, deobfuscating, and analysing Android APKs.

➑️ AutoDroid - A tool for automating interactions with Android devices - including ADB, AndroGuard, and Frida interactivity.

πŸ‘ PocketSmali - A modular and extendable Python tool for emulating simple SMALI instructions.

πŸ› οΈ Broken Droid Factory - A Python and Gradle tool to spin-up pseudo random vulnerable Android applications for training and testing.

🫣 Obfu[DE]Scate - Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions.

βœ… DIS{integrity} - A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.

☒️ DroidDetective - A machine learning malware analysis framework for Android apps.

πŸ’Ύ RUNIC and TAMPER - Android tamper, root, and integrity attestation/ detection demos.


πŸ”Ž Machine Learning and anti-Extremism tools and research | Checkout some of my tools and PhD research into machine learning, extremism, and anti-misinformation.

🐦 Canary - A Chrome extension that uses the Google Gemini LLM and looks out for and blocks extremist content!

πŸ•΅οΈ Pinpoint - Python tooling for the creation and use of a binary classification model for identifying far-right extremist text posts on the Parler social network.

πŸ‘€ User-Compare - A tool for comparing user profiles and returning a confidence score.

πŸ“° News-Article-Text-Classification - A pre-trained model for identifying the topic of news articles.

Pinned

  1. Awesome-Android-Reverse-Engineering Awesome-Android-Reverse-Engineering Public

    A curated list of awesome Android Reverse Engineering training, resources, and tools.

    548 65

  2. Obfu-DE-Scate Obfu-DE-Scate Public

    Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compar…

    Python 151 9

  3. AutoDroid AutoDroid Public

    A tool for automating interactions with Android devices - including ADB, AndroGuard, and Frida interactivity.

    Python 126 11

  4. Monocle Monocle Public

    Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption logic, password strings, vulnerabilities, etc.

    Python 123 7

  5. Tweezer Tweezer Public

    A binary analysis tool for identifying unknown function names, using a word-2-vec model

    Python 47 5

  6. Broken-Droid-Factory Broken-Droid-Factory Public

    BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for training when it comes to vulnerability research, ethical hacking, and pen testing on Android apps.

    Python 35 2