Code Hierarchy Exploration Net (chen)
☆27Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for chen
Users that are interested in chen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 26, 2025Updated 3 months ago
- Python library for code analysis with CPG and Joern☆25Jun 23, 2023Updated 2 years ago
- Restoring Execution Environments of Jupyter Notebooks☆21May 29, 2023Updated 2 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- A grubox theme for ghidra, available in all its variants☆18Aug 2, 2024Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated last year
- Simple language collation for Go☆13Nov 3, 2020Updated 5 years ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆63Apr 27, 2021Updated 4 years ago
- Dockerfile to install and run heartbleed tool☆32Jun 16, 2017Updated 8 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- A creation guide to running a web server on AWS in php☆12Jul 6, 2020Updated 5 years ago
- QC: Quantum Computing Simulator for C☆12Apr 8, 2024Updated last year
- ☆19Aug 2, 2020Updated 5 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆41Feb 22, 2026Updated last month
- Graph data models for RAG applications☆17Mar 28, 2024Updated last year
- Bulk hostname lookup using shodan☆13Jun 1, 2022Updated 3 years ago
- ☆15Mar 16, 2026Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆137Mar 10, 2026Updated 2 weeks ago
- ☆21Nov 28, 2023Updated 2 years ago
- A code skeleton of Samsung's Shannon5123 5G baseband modem.☆20May 6, 2020Updated 5 years ago
- 一个简单的windows的远程控制程序☆13Nov 15, 2017Updated 8 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- 基于C语言实现一个简易的Web服务器,支持Http和Https(基于OpenSSL的TLS协议)☆13Sep 20, 2021Updated 4 years ago
- Quick deployment of auto-deploy tools☆17Oct 11, 2025Updated 5 months ago
- ☆14Jun 11, 2020Updated 5 years ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆16Dec 19, 2025Updated 3 months ago
- ☆13Apr 5, 2015Updated 10 years ago
- A lightweight Headscale Web UI built using Anvil.☆18Dec 28, 2023Updated 2 years ago
- ☆19Sep 8, 2025Updated 6 months ago
- Generate CPG for multiple languages for code and threat analysis☆11Sep 22, 2023Updated 2 years ago
- A (SLEIGH) disassembler that supports multiple architectures☆91Apr 30, 2022Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- public-pentesting-reports☆12Aug 23, 2016Updated 9 years ago
- Yet Another SetWindowsHookExW Injector☆17Nov 3, 2019Updated 6 years ago
- ESP32 based Wi-Fi Intrusion Detection System☆29May 11, 2025Updated 10 months ago
- Library for accessing rtl-sdr libraries from processing☆20Sep 26, 2020Updated 5 years ago