ابزار در حوزه هوش مصنوعی
این حوزه به سرعت در حال رشد است و چندین ابزار رایگان و متنباز (Open-Source) وجود دارد که میتوانید همین امروز از آنها استفاده کنید. این ابزارها معمولاً به صورت پلاگین برای نرمافزارهای معروف مهندسی معکوس عرضه میشوند.
۱. پلاگینهای مبتنی بر هوش مصنوعی برای Ghidra
ابزار Ghidra یک ابزار مهندسی معکوس رایگان خود NSA است، بهترین بستر برای شروع است. چندین پلاگین برای اتصال Ghidra به مدلهای زبانی بزرگ وجود دارد.
پلاگین Ghidra MCP یک پلاگین بسیار محبوب است که به شما اجازه میدهد Ghidra را به مدلهای هوش مصنوعی مختلف (چه مدلهای محلی که روی کامپیوتر خودتان اجرا میکنید مثل Llama، و چه مدلهای آنلاین از طریق API مثل OpenAI) متصل کنید.
پلاگین Ghidra GPT Funner این پلاگین به طور خاص برای تغییر نام هوشمندانه توابع با استفاده از مدلهای GPT طراحی شده است.
ابزار Cutter دانلود آخرین نسخه تا از جدیدترین قابلیتها بهرهمند شوید.
پلاگینی به نام CutterMCP و نسخه بهبودیافته آن CutterMCP-plus دقیقاً همان کاری را انجام میدهد که Ghidra MCP برای Ghidra میکند. این پلاگین به عنوان یک سرور عمل کرده و به مدلهای زبانی بزرگ (LLMs) اجازه میدهد تا به قابلیتهای اصلی Cutter دسترسی پیدا کرده و به صورت خودکار فرآیند مهندسی معکوس را انجام دهند.
چطور کار میکند؟
شما پلاگین را نصب میکنید، کلید API خود (مثلاً از OpenAI) یا آدرس مدل محلی خود را وارد میکنید. سپس میتوانید روی یک تابع در Ghidra کلیک راست کرده و گزینههایی مانند "Explain this function" یا "Suggest a name for this function" را انتخاب کنید. پلاگین کد اسمبلی را به هوش مصنوعی میفرستد و جواب را مستقیماً در محیط Ghidra به شما نشان میدهد.
۲. ابزارهای مستقل
فریمورک Angr این یک فریمورک تحلیل باینری بسیار قدرتمند مبتنی بر پایتون است. هرچند به طور مستقیم یک ابزار هوش مصنوعی نیست، اما بستر اصلی بسیاری از تحقیقات دانشگاهی در زمینه استفاده از AI برای تحلیل خودکار برنامهها (مانند پیدا کردن اکسپلویت) است. کار با آن نیاز به مهارت برنامهنویسی دارد.
@NullError_ir
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
At least three UK organizations hit by SharePoint zero-day hacking campaign
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
At least three UK organizations hit by SharePoint zero-day hacking campaign
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
At least three UK organisations hit by SharePoint zero-day hacking campaign
At least three British organizations have reported to the country’s data protection regulator that hackers exploited bugs affecting on-premise Microsoft SharePoint servers.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
RapperBot Botnet Disrupted, American Administrator Indicted
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
RapperBot Botnet Disrupted, American Administrator Indicted
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
RapperBot Botnet Disrupted, American Administrator Indicted
The US Department of Justice has announced the takedown of the RapperBot botnet and charges against its American administrator.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Microsoft Office.com Suffers Major Outage, Investigation Underway
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Microsoft Office.com Suffers Major Outage, Investigation Underway
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Microsoft Office.com Suffers Major Outage, Investigation Underway – Updated
Microsoft's comprehensive suite of online services, including the central Office.com portal, is currently experiencing a significant and widespread outage, leaving millions of users unable to access essential productivity applications.
❏ </Mr. SAM/> ❏
░▒▓█ CiscoTalos █▓▒░
Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ CiscoTalos █▓▒░
Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cisco Talos Blog
Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices
A Russian state-sponsored group, Static Tundra, is exploiting an old Cisco IOS vulnerability to compromise unpatched network devices worldwide, targeting key sectors for intelligence gathering.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Russian investment platform confirms cyberattack by pro-Ukraine hackers
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Russian investment platform confirms cyberattack by pro-Ukraine hackers
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Russian investment platform confirms cyberattack by pro-Ukraine hackers
The Russian platform Investment Projects said it is working to restore its infrastructure following a cyberattack claimed by the pro-Ukraine group Cyber Anarchy Squad.
Elastic Defend Bypass: UAC Bypass Chain Leading to Silent Elevation
Alireza Hosseini
@NullError_ir 📢
Please open Telegram to view this post
VIEW IN TELEGRAM
Linkedin
Sec Note | Alireza Hosseini
مدتی بود روی باجافزارها (از نظر سرعت، تکنیکها و روشهای رمزنگاری) مطالعه میکردم. یکی از نکات جالبی که دیدم این بود که تقریباً همه این خانوادهها قبل از رمزگذاری، Shadow Copies و بکاپها رو پاک میکنن.
اما یک سؤال برام پیش اومد: برای حذف بکاپها نیاز…
اما یک سؤال برام پیش اومد: برای حذف بکاپها نیاز…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Major password managers can leak logins in clickjacking attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Major password managers can leak logins in clickjacking attacks
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Major password managers can leak logins in clickjacking attacks
Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function
Git 2.51.0 has been officially released after an accelerated 8-week development cycle, introducing significant performance improvements and security enhancements that lay the groundwork for the upcoming Git 3.0 major release.
❏ </Mr. SAM/> ❏
░▒▓█ TheHackersNews █▓▒░
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheHackersNews █▓▒░
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
🔗 ➢➣➤ More ...
@NullError_ir 📢
Telegram
Mr. SAM
یکشنبه
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
۷ ( دی = ۱۰ ) ۱٤۰٤
28 ( دسامبر = december = 12 ) 2025
تکنیکها ، کالبدشکافی ، درک عمیق ، یک قدم جلوتر ...
https://news.1rj.ru/str/boost/NullError_ir
❏ </Mr. SAM/> ❏
░▒▓█ Mandiant █▓▒░
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ Mandiant █▓▒░
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
🔗 ➢➣➤ More ...
@NullError_ir 📢
Google Cloud Blog
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor | Google Cloud Blog
A campaign involving a financially motivated group deploying a downloader that delivers CORNFLAKE.V3 malware.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Feds charge alleged administrator of ‘sophisticated’ Rapper Bot botnet
A 22-year-old Oregon man has been charged with running a powerful botnet-for-hire service used to launch hundreds of thousands of cyberattacks worldwide, the U.S. Justice Department said.
❏ </Mr. SAM/> ❏
░▒▓█ DarkReading █▓▒░
Europe's Ransomware Surge Is a Warning Shot for US Defenders
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ DarkReading █▓▒░
Europe's Ransomware Surge Is a Warning Shot for US Defenders
🔗 ➢➣➤ More ...
@NullError_ir 📢
Darkreading
Europe's Ransomware Surge Is a Warning Shot for US Defenders
We can strip attackers of their power by implementing layered defenses, ruthless patch management, and incident response that assumes failure and prioritizes transparency.
❏ </Mr. SAM/> ❏
░▒▓█ SecurityWeek █▓▒░
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ SecurityWeek █▓▒░
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
🔗 ➢➣➤ More ...
@NullError_ir 📢
SecurityWeek
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
Instead of GPT-5 Pro, your query could be quietly redirected to an older, weaker model, opening the door to jailbreaks, hallucinations, and unsafe outputs.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Death of the Cheque: Australia Moves On
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Death of the Cheque: Australia Moves On
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Death Of The Cheque: Australia Moves On
Check (or cheques) have long been a standard way for moving money from one bank account to another. They’re essentially little more than a codified document that puts the necessary informatio…
❏ </Mr. SAM/> ❏
░▒▓█ BleepingComputer █▓▒░
Hackers steal Microsoft logins using legitimate ADFS redirects
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ BleepingComputer █▓▒░
Hackers steal Microsoft logins using legitimate ADFS redirects
🔗 ➢➣➤ More ...
@NullError_ir 📢
BleepingComputer
Hackers steal Microsoft logins using legitimate ADFS redirects
Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins.
❏ </Mr. SAM/> ❏
░▒▓█ cybersecurity █▓▒░
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ cybersecurity █▓▒░
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
🔗 ➢➣➤ More ...
@NullError_ir 📢
Cyber Security News
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
Link11, a Germany-based global IT security provider, has released insights into the evolving cybersecurity threat landscape and announced the capabilities.
❏ </Mr. SAM/> ❏
░▒▓█ TheRecord █▓▒░
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ TheRecord █▓▒░
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
🔗 ➢➣➤ More ...
@NullError_ir 📢
therecord.media
Britain targets Kyrgyz crypto networks aiding Kremlin with sanctions
The United Kingdom imposed a new tranche of sanctions targeting financial institutions and cryptocurrency networks in Kyrgyzstan that are accused of facilitating Russian sanctions evasion.
❏ </Mr. SAM/> ❏
░▒▓█ hackday █▓▒░
Building a Robotic Arm Without Breaking the Bank
🔗 ➢➣➤ More ...
@NullError_ir 📢
░▒▓█ hackday █▓▒░
Building a Robotic Arm Without Breaking the Bank
🔗 ➢➣➤ More ...
@NullError_ir 📢
Hackaday
Building A Robotic Arm Without Breaking The Bank
There are probably at least as many ways to construct a robotic arm as there are uses for them. In the case of [Thomas Sanladerer] his primary requirement for the robotic arm was to support a digit…