Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.
☆14Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for inspector
Users that are interested in inspector are comparing it to the libraries listed below
Sorting:
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- LiteX-based PCIe MITM, sniffing, fuzzing, device emulation☆19Feb 9, 2022Updated 4 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- Lightweight performance and debugging tools☆17Feb 21, 2020Updated 6 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Experimental LLVM backend for Android applications (HGraph IR-to-IR translation).☆26Nov 29, 2022Updated 3 years ago
- ☆11Feb 5, 2024Updated 2 years ago
- (Keep It) Simple Stupid Database☆10Jul 16, 2017Updated 8 years ago
- Erlang client library for Neo4J's REST API☆39Aug 2, 2016Updated 9 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 7 months ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- iOS 几种常用的布局方法☆10Jun 5, 2019Updated 6 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- 智能家居的演示Demo☆10Feb 24, 2018Updated 8 years ago
- Letgo mobile application clone for my youtube tutorial series https://www.youtube.com/watch?v=GS2095yocNA☆12Apr 15, 2022Updated 3 years ago
- SVN externals emulated in git, to ease migration☆27Jan 21, 2019Updated 7 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- THREADS Conference Archive☆16Aug 1, 2019Updated 6 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Google Play Store and Apple App Store rankings data☆15May 16, 2022Updated 3 years ago
- Memory latency test☆13May 14, 2024Updated last year
- Tool for submitting traces to Pernosco☆13Oct 3, 2025Updated 5 months ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆13Sep 4, 2019Updated 6 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- Lightweight web service clients in the WasmEdge Runtime using the Rust reqwest framework☆12Feb 6, 2026Updated last month
- ☆34Jun 20, 2023Updated 2 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Oct 24, 2020Updated 5 years ago