Hodor for node.js
☆15Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for Hodor
Users that are interested in Hodor are comparing it to the libraries listed below
Sorting:
- ☆13Apr 9, 2022Updated 3 years ago
- ☆20Feb 26, 2024Updated 2 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated 3 weeks ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- ☆24Aug 24, 2025Updated 6 months ago
- This hosts the original version of the PScout Android permission mapping tool☆24Jun 17, 2018Updated 7 years ago
- Verified Wasm runtime☆30Oct 30, 2023Updated 2 years ago
- PScout Android permission mappings☆26Mar 30, 2022Updated 3 years ago
- 2023 第七届强网杯全国网络安全挑战赛☆30Dec 18, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- implementing collafl☆26Mar 18, 2020Updated 5 years ago
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated last year
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆35Nov 22, 2023Updated 2 years ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- ☆37Jul 14, 2025Updated 7 months ago
- ☆39Sep 27, 2022Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 3 months ago
- Reinforce good behaviour with a bark detector and deterrer☆11Jun 10, 2020Updated 5 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- anomalies detection approach☆13Dec 23, 2024Updated last year
- ☆12Dec 22, 2025Updated 2 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- ☆42Aug 4, 2020Updated 5 years ago
- ☆11Sep 6, 2024Updated last year
- ☆10Mar 24, 2022Updated 3 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- JB For Device Checkm8☆11Sep 1, 2023Updated 2 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- A tool designed to increase privacy on Windows and counter malware using various techniques.☆12Apr 9, 2025Updated 10 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year