Troublor / NyxView external linksLinks
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
☆21May 11, 2024Updated last year
Alternatives and similar repositories for Nyx
Users that are interested in Nyx are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2024Updated last year
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 5 months ago
- ☆26Aug 28, 2024Updated last year
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆39Jun 23, 2025Updated 7 months ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- A framework to quantify Web3-based browser fingerprinting and wallet address leakage (USENIX 2023).☆13Aug 8, 2023Updated 2 years ago
- Translate Python and JavaScript into MLIR☆17Aug 27, 2022Updated 3 years ago
- ☆15Dec 29, 2023Updated 2 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆20Oct 5, 2025Updated 4 months ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Sep 14, 2024Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- ☆20Feb 11, 2024Updated 2 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- ☆27Jun 6, 2023Updated 2 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆28Jan 15, 2026Updated 3 weeks ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆25Aug 31, 2022Updated 3 years ago
- ICSE'24 GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis☆94Dec 11, 2024Updated last year
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆25Nov 8, 2023Updated 2 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆62Jan 28, 2026Updated 2 weeks ago
- ☆27Mar 16, 2023Updated 2 years ago
- A symbolic execution engine for EVM smart contract binaries.☆118Dec 2, 2025Updated 2 months ago
- ☆26May 10, 2021Updated 4 years ago
- ☆34Aug 28, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆27Apr 15, 2025Updated 9 months ago
- EF/CF - Extremely Fast smart Contract Fuzzing☆70Jul 11, 2023Updated 2 years ago
- TVMFuzz: fuzzing tensor-level intermediate representation in TVM☆30May 24, 2020Updated 5 years ago
- Genetic program repair using GHC☆33May 16, 2024Updated last year
- ☆89Feb 5, 2026Updated last week
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆39Jul 19, 2022Updated 3 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago