Security-Oriented Analysis of Application Programs
☆13Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for soaap
Users that are interested in soaap are comparing it to the libraries listed below
Sorting:
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- ☆20Jun 7, 2025Updated 8 months ago
- ☆18Sep 4, 2023Updated 2 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Slicing tool for c++ programs using clang AST.☆18Mar 8, 2021Updated 4 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Aug 7, 2015Updated 10 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- ☆30Jan 7, 2021Updated 5 years ago
- ☆26May 10, 2021Updated 4 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- Root Repo for the RLBox Sandboxing Library Research prototype. Note: this is the original research prototype for this library. For the pr…☆24Sep 14, 2023Updated 2 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Test suite for Capsicum☆46Feb 9, 2026Updated 3 weeks ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- a SDK for creating a large mesh network, App example on☆16Feb 26, 2019Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Chaucha functions for usage with Github Actions☆11Sep 18, 2020Updated 5 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week
- Common GreenAddress web files (used by Electron app, Cordova app) or see js_only_deprecated for web/Chrome app☆11Jun 18, 2024Updated last year
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 6 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- ☆38Nov 30, 2020Updated 5 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- Reverse Engineering of the Cisco HWIC-3G-CDMA PCB☆44Mar 7, 2024Updated last year
- Extremely minimal C unit test framework, used by Libevent and Tor☆48Mar 10, 2018Updated 7 years ago