☆27Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for CarVal
Users that are interested in CarVal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A logic-based enterprise network security analyzer☆141Jan 28, 2023Updated 3 years ago
- 一个can总线模糊测试小工具☆21Jul 21, 2022Updated 3 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- Automated CAN Analyzer☆15Dec 3, 2019Updated 6 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆45Jan 25, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆67Oct 25, 2024Updated last year
- A state-aware defense framework against vehicular message injection attacks.☆36Sep 20, 2021Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- CANvas is a fast and inexpensive automotive network mapper that can serve as a basis for many other security applications.☆30Apr 24, 2020Updated 5 years ago
- PentestAgent is a novel LLM-driven penetration testing framework to automate intelligence gathering, vulnerability analysis, and exploita…☆122Dec 20, 2025Updated 3 months ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆10Apr 17, 2024Updated last year
- Artifact of TOSEM accepted paper: "Try with Simpler - An Evaluation of Improved PCA in Log-based Anomaly Detection."☆14Dec 31, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- ☆10Dec 8, 2021Updated 4 years ago
- tiny python script to import kernel symbols☆11Oct 23, 2018Updated 7 years ago
- High-performance key-value store☆12Dec 31, 2018Updated 7 years ago
- Documentation for kernel rookie☆10Dec 11, 2020Updated 5 years ago
- 毕业设计——基于区块链的证书管理系统☆13Apr 21, 2022Updated 3 years ago
- ☆10May 8, 2024Updated last year
- ☆13Sep 22, 2022Updated 3 years ago
- A short course of visual modeling☆30Oct 9, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tesla vehicles now support a new protocol that ensures secure, end-to-end command authentication. This C++ and Arduino library uses this…☆18Nov 18, 2024Updated last year
- Graph-based incremental static analysis of ECMAScript 6 source code repositories☆20Feb 18, 2018Updated 8 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- ☆15Aug 3, 2023Updated 2 years ago
- Android demo client for thingsboard.☆11Apr 10, 2019Updated 7 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 4 months ago
- ☆126May 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- RAPID: Training-free Retrieval-based Log Anomaly Detection with PLM considering Token-level information☆18Jul 11, 2024Updated last year
- RILDefender: An Android Mobile Privacy Protection Service Against SMS Exploits☆16Nov 1, 2024Updated last year
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- ☆11Aug 12, 2022Updated 3 years ago
- Reverse proxy for ultra-low latency streaming☆31May 30, 2024Updated last year
- Entity-Relation Diagram Assisted Hacking Tool☆62Mar 7, 2026Updated last month
- Tesla Model 3 premium amp reverse engineering☆12May 8, 2023Updated 2 years ago