akondrahman / IacSecLinks
Security stuff for iac scripts
☆16Updated 5 years ago
Alternatives and similar repositories for IacSec
Users that are interested in IacSec are comparing it to the libraries listed below
Sorting:
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Updated 12 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- Debugging library to quickly get the minimal crashing test case☆37Updated 7 years ago
- ANTLR 3 fuzzy parser☆49Updated 12 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- Automatically exported from code.google.com/p/rough-auditing-tool-for-security☆88Updated 4 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Updated 9 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Updated 9 years ago
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Updated 8 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- Software Security course☆21Updated 10 years ago
- Security methods for WeAkNess detection☆20Updated 9 months ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 5 years ago
- Compiler Fingerprinting☆14Updated 10 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆61Updated 6 months ago
- ☆26Updated 3 weeks ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Updated 7 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Updated 5 years ago
- Home page of project "KB"☆130Updated 8 months ago
- ☆22Updated 8 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- bitshred research project code.☆14Updated 9 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- Static code search python lib☆18Updated 5 years ago