2017s-IS521
☆13May 26, 2017Updated 8 years ago
Alternatives and similar repositories for 2017-Spring
Users that are interested in 2017-Spring are comparing it to the libraries listed below
Sorting:
- Git-based CTF☆63Dec 5, 2018Updated 7 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- Inferred Model-based Fuzzer☆111Jan 22, 2022Updated 4 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- ☆13Dec 14, 2018Updated 7 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆89May 3, 2024Updated last year
- Implementation of Korean Block Ciphers: NEAT and NES☆31Jun 19, 2017Updated 8 years ago
- 한자 도메인, 안 돼!☆35Aug 9, 2018Updated 7 years ago
- RICC: Robust Collective Classification of Sybil Accounts☆11Jul 12, 2023Updated 2 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆13Jan 5, 2017Updated 9 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆18Jun 21, 2025Updated 9 months ago
- CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines (NDSS '19)☆242Nov 11, 2019Updated 6 years ago
- An investigative study on the security and privacy aspects of Progressive Web Apps☆19Oct 14, 2018Updated 7 years ago
- for icpc☆12Aug 25, 2020Updated 5 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- A collection of JavaScript test suites from JavaScript engine & Test262 repositories.☆22Sep 23, 2020Updated 5 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- noopy - No ops python - is a serverless web framework using AWS Lambda & API Gateway☆11May 9, 2016Updated 9 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- Benchmark and comparison of secure Deep Learning platforms: TF Privacy, PySyft and TF-Encrypted☆10Mar 31, 2021Updated 4 years ago
- ☆13May 9, 2023Updated 2 years ago
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 3 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Throne for Realm mobile database. Realm browser made with electron☆10Aug 9, 2018Updated 7 years ago
- Hong Minhee's blog☆13Apr 19, 2017Updated 8 years ago
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- read process memory with process_vm_readv☆16Feb 10, 2020Updated 6 years ago
- A bash-like 'new tab' page for browser.☆12Mar 4, 2026Updated 2 weeks ago
- 파이썬으로 풀어보는 2017학년도 대학수학능력시험 수학영역☆20Jun 1, 2022Updated 3 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Security-Oriented Analysis of Application Programs☆13Dec 14, 2018Updated 7 years ago