Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program
☆27Apr 18, 2018Updated 7 years ago
Alternatives and similar repositories for STAC
Users that are interested in STAC are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated last month
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- DARPA CASE program☆15Jun 10, 2025Updated 8 months ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- ☆16May 20, 2019Updated 6 years ago
- ☆41Feb 25, 2019Updated 7 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 8 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Source code for the DEF CON 30 CTF Finals.☆55Oct 12, 2022Updated 3 years ago
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆168Dec 4, 2025Updated 3 months ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆67Jun 22, 2020Updated 5 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Fuzzing with controlled compilation☆31Apr 7, 2023Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Mar 5, 2021Updated 4 years ago
- ☆36Sep 30, 2020Updated 5 years ago
- C++ Code☆11Aug 13, 2019Updated 6 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- ☆37Nov 16, 2023Updated 2 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- remem is a C++ library designed for memory manipulation, function calling, and pattern scanning. It supports various calling conventions,…☆10Aug 23, 2024Updated last year
- Build WSA Kernel with Docker☆17Oct 26, 2021Updated 4 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- TreeFuser is a tool that perform traversals fusion for recursive tree traversals written in subset of the c++ language.☆11Aug 13, 2023Updated 2 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- Generate Go bindings for shared C libraries.☆15Jul 13, 2024Updated last year
- websocket-protocol's implementation with multithread synchronization model in C++☆17Jul 23, 2017Updated 8 years ago
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- netease python2 inject hook☆13Jan 8, 2025Updated last year
- MSI creator for exe setup/installer☆11Jun 27, 2023Updated 2 years ago
- RISC-V to x86/64 instruction emulator written in C/C++☆10Jan 10, 2022Updated 4 years ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- 🧠 A field guide to mnemonics for engineers: outages, RCAs, infra design, burnout, and conflict. Structured entries with when-to-use, pit…☆16Feb 1, 2026Updated last month