baiduxlab / sgxrayLinks
☆44Updated 4 years ago
Alternatives and similar repositories for sgxray
Users that are interested in sgxray are comparing it to the libraries listed below
Sorting:
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- Core A2P2V functionality (command line based)☆68Updated last year
- Scripts I used during CTP☆67Updated 5 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- Presentations from the CX Security Labs team☆34Updated 2 months ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 9 months ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆116Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆90Updated 6 months ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ☆36Updated 5 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago