andrew-d / rough-auditing-tool-for-securityView external linksLinks
Automatically exported from code.google.com/p/rough-auditing-tool-for-security
☆89May 5, 2021Updated 4 years ago
Alternatives and similar repositories for rough-auditing-tool-for-security
Users that are interested in rough-auditing-tool-for-security are comparing it to the libraries listed below
Sorting:
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆14Mar 4, 2024Updated last year
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 5 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- ☆43Mar 9, 2016Updated 9 years ago
- Parses MSDN documentation into an XML file☆31Jan 10, 2012Updated 14 years ago
- An automatic API misuse checker for C programs!☆19Apr 3, 2019Updated 6 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Heap analysis tooling for dlmalloc☆32Jun 13, 2022Updated 3 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Yet Another Source Code Analyzer☆184Jan 27, 2022Updated 4 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- This is a fork. Not sure where the original went! -pave Notes for all my Pentesting to help my bad memory :p☆26Dec 11, 2015Updated 10 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆39Updated this week
- ☆14Mar 12, 2023Updated 2 years ago
- ☆10Jul 10, 2021Updated 4 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆29Jul 25, 2019Updated 6 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 4 years ago