We produced a variety of security tools, discover some of them below
Golem – Automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM
Golem automates C/C++ vulnerability discovery by combining Semgrep rule scans, LLVM call-graph & CFG slicing, and AI-driven context analysis. It flags potential security issues, generates rich graph artifacts, and leverages large-language models (GPT-4 or Ollama) to produce a detailed, prioritized audit report, so you can find and fix critical bugs faster. https://github.com/20urc3/golem
auditor.codes – A web platform to practice finding real-world C/C++ vulnerabilities
• Hosted web application on: auditor.codes
• 8000+ challenges + Progress tracking + leaderboard
• Beginner-friendly
• Fully open source: https://github.com/20urc3/auditor.codes
Aplos Fuzzer – A simple straight-to-the-point fuzzer for Windows binaries.
This tool is meant to be an educational tool allowing researchers and security enthusiasts to start playing with fuzzing without having to use their brain. The tool provides an extremely basic interface that takes a target and an initial testcases folder as arguments and starts running a fuzzing campaign. https://github.com/20urc3/Aplos
Sekiryu – A comprehensive suite of tools designed to streamline and automate headless Ghidra.
This toolkit provides a wide range of scripts that can be executed both inside and alongside Ghidra, enabling users to perform tasks such as Vulnerability Hunting, Pseudo-code Commenting with ChatGPT and Reporting with Data Visualization on the analyzed codebase. It allows user to load and save their own script and interract with the built-in API of the script. https://github.com/20urc3/Sekiryu