Call graph-based analysis tools for Solidity smart contracts. Visualize contract interactions, generate Foundry tests, analyze storage patterns, and trace execution paths.
☆30Oct 4, 2025Updated 5 months ago
Alternatives and similar repositories for traverse
Users that are interested in traverse are comparing it to the libraries listed below
Sorting:
- Extension to Scaffold, Run and Debug Invariant Tests with Echidna, Medusa, Halmos and Foundry. Always published under Recon-Fuzz. Recomme…☆33Feb 11, 2026Updated 3 weeks ago
- ☆25Updated this week
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- ☆35Jul 4, 2025Updated 8 months ago
- ☆27Jan 30, 2026Updated last month
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- A boilerplate for dApps on Lisk☆12Jul 3, 2025Updated 8 months ago
- A Symbolic Ethereum Virtual Machine (EVM) bytecode interpreter, parser and decompiler, along with several other utils for programmaticall…☆107Mar 16, 2025Updated 11 months ago
- Steam scripts for Outlands shard☆10Feb 15, 2020Updated 6 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- CLI for importing Sourcify verified contract to Etherscan in the simplest and fastest way☆10Jun 18, 2023Updated 2 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Windows command line utility to set Intel FIVR voltage offset.☆13Mar 7, 2021Updated 4 years ago
- Download browser extension's source code as zip☆21Nov 23, 2025Updated 3 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- DApp that let's you buy me a coffee with crypto ☕️☆13Oct 24, 2022Updated 3 years ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- ☆12Mar 15, 2020Updated 5 years ago
- Install dnscrypt-proxy on Ubuntu 18.04☆10Dec 15, 2018Updated 7 years ago
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 6 months ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- ☆12Mar 1, 2021Updated 5 years ago
- Audio tools for iOS and OS X - (ノಥ益ಥ)ノ ┻━┻☆10Oct 13, 2016Updated 9 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆15Sep 2, 2024Updated last year
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Easy to use ANSI control codes☆13Sep 26, 2023Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated 2 weeks ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- A simple and easy-to-use language and compiler for querying blockchain data.☆12Sep 24, 2023Updated 2 years ago
- Sample API for authentication using AWS SAM and Cognito☆10Mar 5, 2023Updated 3 years ago