☆13Feb 22, 2022Updated 4 years ago
Alternatives and similar repositories for Control-Flow-Structuring
Users that are interested in Control-Flow-Structuring are comparing it to the libraries listed below
Sorting:
- hack vm☆12Nov 30, 2019Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ALIEN: idA Local varIables/inLine functIons rEcogNizer☆18Dec 21, 2021Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- This is an IDA plugin to recover class information from C++ binary.☆19Aug 4, 2020Updated 5 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- ☆11Oct 16, 2021Updated 4 years ago
- Small binja plugin to import header file to types☆18Nov 11, 2022Updated 3 years ago
- ☆16Feb 25, 2024Updated 2 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ☆16Sep 27, 2021Updated 4 years ago
- 专注区块链基础技术研究☆18Nov 11, 2018Updated 7 years ago
- ☆20Nov 5, 2018Updated 7 years ago
- Binary Ninja Call Graph plugin☆24Apr 20, 2022Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- ☆22Feb 14, 2022Updated 4 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- Android Security Bug Queries for CheckMarx☆20Sep 13, 2022Updated 3 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- writeups for our challenges☆147Dec 11, 2022Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Dec 14, 2021Updated 4 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Driver Security Analyzer☆53Oct 27, 2020Updated 5 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 4 months ago
- ☆55Oct 4, 2021Updated 4 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆54Updated this week