Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program
☆27Apr 18, 2018Updated 8 years ago
Alternatives and similar repositories for STAC
Users that are interested in STAC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DARPA Cyber Grand Challenge Linux source code☆18Jul 9, 2015Updated 10 years ago
- DARPA CASE program☆16Jun 10, 2025Updated 10 months ago
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- ☆16May 20, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Joana - Information Flow Control for Java☆95Dec 22, 2021Updated 4 years ago
- Dynamic analysis of multithreaded C programs☆13Feb 7, 2020Updated 6 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 11 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- This repo contains the source code of the physical layer developed for the DARPA Spectrum Collaboration Challenge (SC2).☆12Nov 21, 2019Updated 6 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- Challenge binaries (CBs) and tools from DARPA's Cyber Grand Challenge (CGC)☆20Feb 21, 2022Updated 4 years ago
- Adept framework for information extraction (IE), natural language processing (NLP) and human language technology (HLT). For more informat…☆10Nov 17, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- FPsolve: solver for polynomial equations over omega-continuous semirings☆11Aug 15, 2015Updated 10 years ago
- Triton for OpenCL backend, and use mlir-translate to get source OpenCL code☆27Aug 27, 2025Updated 8 months ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Fuzzing with controlled compilation☆31Apr 7, 2023Updated 3 years ago
- Prototype of the system described in "Trace Types and Denotational Semantics for Sound Programmable Inference in Probabilistic Languages"☆11Aug 8, 2025Updated 8 months ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- ICRA: a static analyzer based on interprocedural compositional recurrence analysis☆11Feb 27, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 8 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- A Constraint Solver☆12Dec 4, 2015Updated 10 years ago
- ProBO: Versatile Bayesian Optimization Using Any Probabilistic Programming Language☆16Jul 4, 2019Updated 6 years ago
- Source code for the DEF CON 30 CTF Finals.☆55Oct 12, 2022Updated 3 years ago
- ☆38Nov 16, 2023Updated 2 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 4 years ago
- An Impractical Stack Language☆14Jun 12, 2020Updated 5 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- The sec3 audit reports and publications☆17Feb 2, 2026Updated 3 months ago
- A Delphi symbol name recovery tool for reverse engineers.☆26Jan 17, 2026Updated 3 months ago