A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
☆22Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for Heap-Overflow-Detection
Users that are interested in Heap-Overflow-Detection are comparing it to the libraries listed below
Sorting:
- ☆17Sep 23, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- My BS. Thesis: On Operation Of Brain Neurons In Autism: Multi-agent Reinforcement Learning Approach☆12Sep 23, 2021Updated 4 years ago
- ☆41May 7, 2024Updated last year
- A simple, reliable and reasonably fast network capture analyzer.☆25Feb 7, 2026Updated 3 weeks ago
- ☆11Aug 5, 2020Updated 5 years ago
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 8 months ago
- Statistics from our binary transformation framework☆11Jan 16, 2025Updated last year
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- JP2KLib.dll harness for WinAFL☆43Apr 20, 2021Updated 4 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- IEEE S&P 2023 - DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing☆14Dec 16, 2024Updated last year
- ☆11Mar 18, 2021Updated 4 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- a viewer for for lancedb. including some actions like CRUD etc☆12Apr 27, 2025Updated 10 months ago
- ☆12Sep 29, 2025Updated 5 months ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- Some sample codes for blog article☆13Sep 15, 2022Updated 3 years ago
- The EM Algorithm for Gaussian Mixtures (高斯混合模型的EM算法实现)☆12Dec 30, 2018Updated 7 years ago
- Public repo for ETH Escape CTF @ Devcon 2024: https://devcon.org/☆13Dec 11, 2024Updated last year
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago
- ☆12Oct 21, 2020Updated 5 years ago
- ☆11May 24, 2022Updated 3 years ago
- WHISPER is a comprehensive benchmark suite for emerging persistent memory technologies.☆10May 10, 2017Updated 8 years ago
- ☆12Nov 8, 2024Updated last year
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- ☆12Jun 20, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- code emulator base on unicorn engine☆51Apr 23, 2018Updated 7 years ago
- code of RE☆11Jun 8, 2018Updated 7 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago