Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"
☆29Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for regrets
Users that are interested in regrets are comparing it to the libraries listed below
Sorting:
- ☆12Sep 19, 2023Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆200Mar 6, 2024Updated 2 years ago
- Android Al-Khaser☆14Dec 12, 2023Updated 2 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago
- Challenges for INShAck 2018☆25May 11, 2019Updated 6 years ago
- GuidedSampler: Coverage-guided Sampling of SMT Solutions☆15Jul 9, 2025Updated 8 months ago
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago
- A repository to help share financial-variables that people and tools care about☆16Nov 18, 2025Updated 4 months ago
- Transformer Neural Network for Dynamic Malware Detection☆39Mar 5, 2026Updated 2 weeks ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Mar 12, 2026Updated last week
- Optimizers for/and sklearn compatible Machine Learning models☆10Mar 4, 2023Updated 3 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- Contains challenges, write-ups, and deployment configurations from b01lersCTF 2023.☆12Apr 3, 2023Updated 2 years ago
- A tool for parallel and distributed enumeration of cliques and diameter two kplexes.☆15Dec 24, 2022Updated 3 years ago
- ☆23Oct 8, 2025Updated 5 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Arduino library to support I-NUCLEO-LRWAN1 LoRa® expansion board based on USI® LoRaWAN™ technology module.☆17Sep 4, 2025Updated 6 months ago
- ☆14Jan 1, 2019Updated 7 years ago
- ☆19Aug 4, 2022Updated 3 years ago
- A handy CLI tool for bulk-sending emails☆17Mar 6, 2025Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19May 23, 2022Updated 3 years ago
- An implementation of memcpy for amd64 with clang/gcc☆15Feb 7, 2022Updated 4 years ago
- Download raw (free) APKs from Google Play Store☆10Apr 26, 2018Updated 7 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Nov 25, 2017Updated 8 years ago
- implementation of some algorithms seen during the Algorithm Engineer course @ UniPi☆19Jan 29, 2019Updated 7 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Sep 24, 2023Updated 2 years ago
- Official code for Continuous-Time Functional Diffusion Processes (NeurIPS 2023).☆21May 5, 2024Updated last year
- SMTSampler: Efficient Stimulus Generation from Complex SMT Constraints☆31Sep 20, 2019Updated 6 years ago
- GeMU, the generic malware unpacker based on QEMU☆24Updated this week
- CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis☆17Jun 14, 2024Updated last year
- Service provider di base con autenticazione SPID☆24Apr 4, 2021Updated 4 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Independent fork of LaurieWired's GhidraMCP for continued development☆25Oct 23, 2025Updated 4 months ago
- 2021 Machine Learning Security Evasion Competition☆13Sep 29, 2021Updated 4 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Mar 12, 2026Updated last week
- Gendered Ambiguous Pronouns Shared Task☆31Nov 21, 2022Updated 3 years ago