BHUSA'24: Cuda-pretrained Inference Decompile Agent (CuIDA)
☆15Aug 8, 2024Updated last year
Alternatives and similar repositories for CuIDA
Users that are interested in CuIDA are comparing it to the libraries listed below
Sorting:
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- 台灣水庫即時水情與歷年統計☆15Feb 23, 2026Updated last week
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ☆13Dec 28, 2019Updated 6 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- ☆15May 23, 2019Updated 6 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated 11 months ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- Binary analysis MCPs collections☆99Aug 26, 2025Updated 6 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- python多进程爬虫+文件/SQL存储☆10Mar 7, 2022Updated 3 years ago
- 一些学习笔记 Good Good Study Day Day Up !☆12Mar 1, 2023Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- linux-exploit☆14Jun 12, 2019Updated 6 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆18Jun 9, 2023Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- XII : TLS1.3/暗号ゼミ [全国大会2018-集中開発コース]☆16Dec 22, 2018Updated 7 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆14Mar 8, 2022Updated 3 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆18Jan 20, 2025Updated last year