cyber-itl / citl-static-analysis
CITL's static analysis engine for native code artifacts
☆20Updated 3 years ago
Alternatives and similar repositories for citl-static-analysis:
Users that are interested in citl-static-analysis are comparing it to the libraries listed below
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆43Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- The Dumb Network Fuzzer☆20Updated last year
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆32Updated 10 months ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- ☆47Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- QL Workshop☆16Updated 5 years ago
- Polyglot detector☆21Updated last year
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- ☆19Updated 3 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- A FUSE module to mount captured network data☆37Updated last month
- Simple rust fuzzer☆23Updated 4 years ago
- Slides, papers, etc☆31Updated last year
- LKRG bypass methods☆72Updated 5 years ago