Picon
☆39Apr 16, 2017Updated 8 years ago
Alternatives and similar repositories for picon
Users that are interested in picon are comparing it to the libraries listed below
Sorting:
- ProTIP permet de caractériser la connectivité réelle entre composants d'une architecture PCI Express☆11Nov 9, 2023Updated 2 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A jabber logger and web interface☆12Jan 5, 2026Updated 2 months ago
- Simple, secure and composable I/O abstraction for construction of efficient computation workflows.☆10Jun 11, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 9 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- clone from myJIT(a fork of GNU lightning)☆11Mar 17, 2015Updated 10 years ago
- Compute cyclomatic complexity of functions based on the gcc internal representation.☆20Feb 21, 2017Updated 9 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- A solver for GCHQ's christmas card puzzle☆12Dec 14, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- HeteroSim is a full system simulator supporting x86 multicore processors combined with a FPGA via bus-based architecture. Flexible design…☆21Jul 11, 2016Updated 9 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- ☆18Sep 2, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- A cryptographic method that defends against side-channel attacks☆25Nov 7, 2016Updated 9 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Libraries for reliable manipulation JSON objects.☆23May 6, 2022Updated 3 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- A SAT solver implementation in VHDL, team tussle☆21Apr 13, 2016Updated 9 years ago
- WER Server☆19Feb 26, 2017Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- State-of-the-art in reversible logic synthesis☆24Jul 16, 2016Updated 9 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago