Software Security course
☆23Mar 6, 2015Updated 11 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.☆44Aug 10, 2025Updated 7 months ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- hardware security course from Coursera and University of Maryland☆28Mar 12, 2015Updated 11 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Equal Experts Secure Delivery Playbook☆27Feb 21, 2023Updated 3 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- AST - Extractor for LLVM☆18Feb 23, 2021Updated 5 years ago
- COM S 413/513 and CPR E 513 Program Analysis @ Iowa State University☆29Nov 3, 2023Updated 2 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- Open-source challenges for Naumachia☆13Sep 18, 2023Updated 2 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- ☆30May 23, 2017Updated 8 years ago
- DBProgramming-Sep-2021☆11May 9, 2023Updated 2 years ago
- ☆30Mar 16, 2026Updated last week
- ☆27May 29, 2015Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Materials and Information for Ethics of Artificial Intelligence and Machine Learning☆11Sep 29, 2023Updated 2 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- My humble attempt at getting tensorflow and the ESP32-CAM to cooperate☆15Jun 21, 2022Updated 3 years ago
- Data for LLM4Vuln☆14Jan 28, 2024Updated 2 years ago
- Hacking Wars Capture The Flag☆10Dec 29, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- Embedded AppSec Best Practices☆45Oct 22, 2025Updated 5 months ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago