Read only mirror - No pull requests
☆20May 7, 2021Updated 4 years ago
Alternatives and similar repositories for expliot
Users that are interested in expliot are comparing it to the libraries listed below
Sorting:
- ☆18Aug 5, 2020Updated 5 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- ☆15Aug 3, 2023Updated 2 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 5 months ago
- Fuzz testing framework for network protocols.☆17May 23, 2020Updated 5 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Mar 16, 2022Updated 3 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- ☆32Apr 2, 2024Updated last year
- Structures de Données et Algorithmes en C++☆12Jul 7, 2025Updated 7 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Jul 6, 2023Updated 2 years ago
- ☆32Jul 27, 2020Updated 5 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Dec 31, 2021Updated 4 years ago
- ☆34Jun 5, 2023Updated 2 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Jul 14, 2022Updated 3 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- headless-ida-mcp-server☆29Apr 4, 2025Updated 10 months ago
- A complete pipeline for fine-tuning YOLOv8 pose models with custom datasets. Supports automatic and semi-automatic annotation for efficie…☆15Feb 9, 2025Updated last year
- An ecommerce website ✍ using Django and Python with sslcommerz payment system.☆15May 18, 2025Updated 9 months ago
- GeoJSON Mexican States Database provides verified geographical data for Mexican states and colonies, sourced from SEPOMEX official record…☆24Feb 10, 2025Updated last year
- Immigration & Asylum case documents API☆11Feb 20, 2026Updated last week
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- ☆13Sep 7, 2023Updated 2 years ago
- ☆13May 8, 2024Updated last year
- ☆17Dec 25, 2024Updated last year
- A tool for determining if a pickleball is in or out of bounds☆14Feb 3, 2025Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- Run fuzzing experiments in Docker☆32Mar 17, 2021Updated 4 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Knowledge Base 慢雾安全团队知识库☆29Oct 22, 2019Updated 6 years ago
- ECP5 FPGA DEV BOARD☆10Apr 19, 2021Updated 4 years ago
- Modern analytics dashboard for real-time data visualization. Customizable widgets, intuitive interface, powerful insights at a glance.☆20Apr 21, 2025Updated 10 months ago
- THE LAST CRONE-B MULTI WHATSAPP BOT☆16Feb 21, 2025Updated last year