Software Security course
☆23Mar 6, 2015Updated 11 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.☆44Aug 10, 2025Updated 8 months ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆20Feb 20, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆10Apr 11, 2023Updated 3 years ago
- A WebExtension for users of synchronized reading lists to add a Wikimedia wiki page from the browser.☆16Apr 23, 2020Updated 6 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 months ago
- ☆12Aug 8, 2019Updated 6 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- AST - Extractor for LLVM☆18Feb 23, 2021Updated 5 years ago
- COM S 413/513 and CPR E 513 Program Analysis @ Iowa State University☆29Nov 3, 2023Updated 2 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- ☆13Mar 23, 2023Updated 3 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆17Oct 18, 2025Updated 6 months ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆23Jul 30, 2016Updated 9 years ago
- This is a shared native SQLite library used for Couchbase Lite Android/Java.☆20Jun 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- ☆23May 11, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- DBProgramming-Sep-2021☆11May 9, 2023Updated 2 years ago
- ☆27May 29, 2015Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- 🐍 Python notlarım☆12Jul 2, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Materials and Information for Ethics of Artificial Intelligence and Machine Learning☆11Sep 29, 2023Updated 2 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- My humble attempt at getting tensorflow and the ESP32-CAM to cooperate☆15Jun 21, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆29Apr 14, 2026Updated 3 weeks ago
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- ☆13May 28, 2023Updated 2 years ago