eurecom-s3 / AAl-Khaser
Android Al-Khaser
☆14Updated last year
Alternatives and similar repositories for AAl-Khaser:
Users that are interested in AAl-Khaser are comparing it to the libraries listed below
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆27Updated last year
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆363Updated last year
- Ghidra Headless Scripts for Automated Analysis (Decompilation and Disassembly)☆70Updated 2 years ago
- Fuzz anything with Program Environment Fuzzing☆378Updated 2 months ago
- KronoDroid Dataset☆32Updated 2 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆47Updated last week
- ☆65Updated 5 months ago
- FLARE Team's Binary Navigator☆247Updated last week
- ☆116Updated last year
- A list of awesome malware detection tools☆76Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆249Updated 4 months ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆619Updated 3 weeks ago
- ☆27Updated last month
- PASTIS: Collaborative Fuzzing Framework☆162Updated 7 months ago
- ☆315Updated 9 months ago
- Quarkslab conference talks☆289Updated 2 weeks ago
- ☆224Updated last year
- Code Coverage Exploration Plugin for Ghidra☆346Updated 8 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆61Updated 9 months ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆43Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆173Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆183Updated 7 months ago
- BINSEC binary-level open-source platform☆345Updated last month
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆12Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆50Updated 10 months ago
- ☆101Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆111Updated 3 weeks ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆616Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆151Updated 4 months ago
- MBC content in markdown☆425Updated this week