ANSSI-FR / piconView external linksLinks
Picon
☆39Apr 16, 2017Updated 8 years ago
Alternatives and similar repositories for picon
Users that are interested in picon are comparing it to the libraries listed below
Sorting:
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- A jabber logger and web interface☆12Jan 5, 2026Updated last month
- Simple, secure and composable I/O abstraction for construction of efficient computation workflows.☆10Jun 11, 2016Updated 9 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 8 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated 3 weeks ago
- ☆18Nov 19, 2020Updated 5 years ago
- Compute cyclomatic complexity of functions based on the gcc internal representation.☆20Feb 21, 2017Updated 8 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- A solver for GCHQ's christmas card puzzle☆12Dec 14, 2015Updated 10 years ago
- ☆15Apr 5, 2016Updated 9 years ago
- HeteroSim is a full system simulator supporting x86 multicore processors combined with a FPGA via bus-based architecture. Flexible design…☆21Jul 11, 2016Updated 9 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- ☆18Sep 2, 2020Updated 5 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ☆85Apr 10, 2023Updated 2 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Libraries for reliable manipulation JSON objects.☆23May 6, 2022Updated 3 years ago
- A SAT solver implementation in VHDL, team tussle☆21Apr 13, 2016Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- WER Server☆19Feb 26, 2017Updated 8 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- ☆90Mar 15, 2017Updated 8 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- A PDF parser and validator☆314Feb 27, 2018Updated 7 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- ☆25Nov 2, 2021Updated 4 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago