lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).
☆14Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for lwip-bug-finder
Users that are interested in lwip-bug-finder are comparing it to the libraries listed below
Sorting:
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- an Internet Key Exchange V2 library in go☆12Jul 7, 2017Updated 8 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆14Feb 12, 2025Updated last year
- Some much-needed sanity for byte-wrangling in python3.☆43Jan 26, 2023Updated 3 years ago
- ☆45Mar 13, 2022Updated 3 years ago
- ☆28Apr 18, 2024Updated last year
- ☆12Sep 13, 2023Updated 2 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Example Manticore scripts☆68Dec 7, 2023Updated 2 years ago
- SECD microprocessor reimplementation in VHDL☆36Nov 13, 2019Updated 6 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Jul 29, 2014Updated 11 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- SQLAlchemy bindings for WordPress☆13Oct 22, 2010Updated 15 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- ☆11Jan 5, 2023Updated 3 years ago
- Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE☆334Feb 25, 2026Updated last week
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Very simple and stupid TCP/IP stack written in C☆10Mar 25, 2016Updated 9 years ago
- Automatic Vulnerability Discovery☆38Mar 30, 2019Updated 6 years ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- A single-page web application supporting collaborative code editing, compiling and execution.☆10Sep 18, 2018Updated 7 years ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Jan 20, 2023Updated 3 years ago
- 📚 Step to step guide on how to migrate a WordPress website☆11Aug 16, 2017Updated 8 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- An online tool to prototype and generate a base CSS theme☆14Apr 23, 2024Updated last year