Automatically attempts to solve simple CTF steganography challenges by running many existing tools and searching the output for a flag format
☆24May 1, 2019Updated 6 years ago
Alternatives and similar repositories for stegctfsolver
Users that are interested in stegctfsolver are comparing it to the libraries listed below
Sorting:
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆34Jan 25, 2025Updated last year
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- ☆28Apr 18, 2024Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- 🔐ㅤSimple C++ Image Steganography CLI tool to encrypt and decrypt messages hidden using RGB channel manipulation.☆11Dec 6, 2023Updated 2 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- This Android Application encodes and decodes secret text message and image into and from the cover image. To encode text message and imag…☆11Jul 12, 2024Updated last year
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 3 weeks ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Automatic Vulnerability Discovery☆38Mar 30, 2019Updated 6 years ago
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Jun 19, 2020Updated 5 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- Some collection of router firmware tools☆11Aug 4, 2020Updated 5 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆13May 5, 2018Updated 7 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Algerian Wilayas list in different formats (XML, JSON, xsl..etc) for the sake of DRY☆14May 20, 2014Updated 11 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Updated this week
- LLM Security Guard for Code☆21Sep 8, 2024Updated last year
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 3 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- ☆15May 6, 2021Updated 4 years ago
- Une application Android qui utilise l'API du site Tariki.dz☆10Aug 27, 2016Updated 9 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- A Universal 32-bit iBoot patcher for iPhone OS 2.0 --> iOS 10☆11Mar 11, 2020Updated 5 years ago