Software Security course
☆23Mar 6, 2015Updated 10 years ago
Alternatives and similar repositories for softwareSecurity
Users that are interested in softwareSecurity are comparing it to the libraries listed below
Sorting:
- Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.☆44Aug 10, 2025Updated 6 months ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- A WebExtension for users of synchronized reading lists to add a Wikimedia wiki page from the browser.☆16Apr 23, 2020Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- AST - Extractor for LLVM☆18Feb 23, 2021Updated 5 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- This is a shared native SQLite library used for Couchbase Lite Android/Java.☆20Jun 8, 2020Updated 5 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- ☆23May 11, 2017Updated 8 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- mirror of libevdev☆29Jun 13, 2018Updated 7 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- The collection of all Python program from various CTF's☆26Oct 11, 2015Updated 10 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Python object model interface for the Vivint cloud API.☆32Feb 11, 2021Updated 5 years ago
- ☆27May 29, 2015Updated 10 years ago
- hardware security course from Coursera and University of Maryland☆28Mar 12, 2015Updated 10 years ago
- ☆18Mar 14, 2025Updated 11 months ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- A serious attempt to implement multi-threading to nmap module, which would result in faster scanning speed. I know that one can write NSE…☆27Oct 13, 2018Updated 7 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago