☆23Jun 22, 2024Updated last year
Alternatives and similar repositories for ChkUp
Users that are interested in ChkUp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆71Jun 21, 2024Updated last year
- AFL++ with support for FormatFuzzer☆18May 28, 2025Updated 10 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- ☆97May 4, 2025Updated 11 months ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Nov 30, 2020Updated 5 years ago
- Certificate Fuzzer based on the work by Johannes Roth (cryptosource)☆13Jun 23, 2020Updated 5 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- Docker container with all extra tools installed to get the most out of binwalk☆20Dec 17, 2020Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 11 months ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆16Jan 17, 2025Updated last year
- ☆13Apr 7, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Library to ingest and generate VEX documents☆20Mar 9, 2026Updated last month
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- FirmSec Dataset☆47Oct 15, 2025Updated 6 months ago
- Flopz - Firmware Liberation on Python☆14Jun 22, 2024Updated last year
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 5 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆62Jul 6, 2025Updated 9 months ago
- ☆29Mar 21, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆47May 27, 2023Updated 2 years ago
- ☆11Sep 6, 2024Updated last year
- ☆17Mar 6, 2022Updated 4 years ago
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated 2 years ago
- panel admin☆16Oct 13, 2024Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- MacOS 超级屏幕录制,支持排除特定应用进行屏幕录制☆24Oct 31, 2024Updated last year
- A curated list of research and repositories on the novel technique of hardware fuzzing☆23Mar 26, 2026Updated 2 weeks ago
- ☆239Jan 14, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- ☆14Nov 10, 2019Updated 6 years ago
- ☆15Aug 5, 2023Updated 2 years ago
- code to reverse vxworks 5.x password hashes☆17Sep 14, 2016Updated 9 years ago
- Firmware Analysis Tool☆177Nov 6, 2024Updated last year
- x86 / x64 Processor Manual for Binary Ninja☆16Mar 7, 2019Updated 7 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year