andymeneely / attack-surface-metrics
Scripts for collecting metrics of the attack surface
☆14Updated 3 years ago
Alternatives and similar repositories for attack-surface-metrics:
Users that are interested in attack-surface-metrics are comparing it to the libraries listed below
- ☆61Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- ☆36Updated 2 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- ☆48Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 10 years ago
- ☆75Updated 7 months ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆110Updated 8 years ago
- Example queries for joern☆18Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Recon materials☆27Updated 7 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Updated 5 years ago
- covFuzz☆34Updated 7 years ago
- ☆34Updated 8 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆26Updated 9 years ago
- ☆28Updated 2 years ago
- Precise Code Tracking (Vim)☆31Updated 8 years ago
- Fuzzing results for various interpreters.☆80Updated 6 years ago
- Differential fuzzing for the masses!☆150Updated 7 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 4 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- free crypto audit☆31Updated 7 years ago
- Tools for timing attacks☆18Updated 9 years ago