a secret detection tool
☆39May 9, 2025Updated 9 months ago
Alternatives and similar repositories for KEYSENTINEL
Users that are interested in KEYSENTINEL are comparing it to the libraries listed below
Sorting:
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Mar 5, 2025Updated last year
- Source code of PurPliance analysis tool.☆18Mar 11, 2024Updated last year
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Aug 31, 2025Updated 6 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- ☆19Jul 26, 2023Updated 2 years ago
- ☆32Sep 13, 2024Updated last year
- ☆24Jun 10, 2023Updated 2 years ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Dec 14, 2024Updated last year
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 10 months ago
- ☆24Aug 15, 2020Updated 5 years ago
- Intelligent kernel error injection/testing tool based on large model and eBPF.(基于大 模型和eBPF的智能化kernel错误注入、测试工具)☆39Apr 16, 2025Updated 10 months ago
- Lightweight file system☆11Sep 9, 2019Updated 6 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- Plugin to ease reversing iOS projects☆124Feb 19, 2026Updated 2 weeks ago
- ☆12Dec 22, 2025Updated 2 months ago
- 爬取百度指数数据☆12Dec 8, 2022Updated 3 years ago
- 每天一个技术点☆10Sep 10, 2023Updated 2 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated 2 weeks ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- The Geospatial Analysis Integrity Tool (GAIT) validates data against a data model. GAIT checks geometry, feature codes, attribute values …☆13Apr 23, 2018Updated 7 years ago
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆12Jun 5, 2025Updated 9 months ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- ☆15Feb 11, 2025Updated last year
- ☆18May 30, 2025Updated 9 months ago
- some useful configs☆10Oct 7, 2025Updated 4 months ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆26Dec 25, 2025Updated 2 months ago
- ☆11Oct 17, 2024Updated last year
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- ☆14Feb 25, 2026Updated last week
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆36Oct 6, 2025Updated 4 months ago
- ☆11Mar 5, 2023Updated 3 years ago
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 7 months ago