benlaurie / opensslLinks
TLS/SSL and crypto library
☆6Updated 7 years ago
Alternatives and similar repositories for openssl
Users that are interested in openssl are comparing it to the libraries listed below
Sorting:
- ☆17Updated 7 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- lte security☆41Updated 9 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Collection of scripts for radare2☆27Updated 6 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- ☆26Updated 8 years ago
- ☆24Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- ☆38Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- Triton based R2 plugin for concolic execution and total control☆32Updated 6 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 11 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆51Updated 4 years ago
- ☆38Updated 12 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Updated 11 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- ☆28Updated 2 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆28Updated 9 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago