Finding security vulnerabilities with CodeQL in C/C++
☆14Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for codeql-cpp
Users that are interested in codeql-cpp are comparing it to the libraries listed below
Sorting:
- ☆16Apr 6, 2023Updated 2 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Library for constructing data-centric processing pipelines☆12Updated this week
- ☆26Nov 24, 2025Updated 3 months ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- The Python Version of our Not Go-ing Anywhere Vulnerable Application☆11Jan 11, 2024Updated 2 years ago
- Resources required for my BiliBili Pwn tutorial☆12Feb 10, 2023Updated 3 years ago
- Attempts at fuzzing Python unpicklers☆41Mar 24, 2024Updated last year
- Library to manipulate and create Sourcetrail databases☆23May 27, 2025Updated 9 months ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A Hand-drawn style jekyll theme based on PaperCSS.☆14Sep 26, 2023Updated 2 years ago
- ☆12Jun 10, 2019Updated 6 years ago
- Compile Binary Ninja's MLIL to LLVM, for purposes of analysis, patching, and compiling it back to a binary again.☆62Jun 3, 2022Updated 3 years ago
- A Python package written in Rust for email verification without sending any emails.☆17Dec 29, 2023Updated 2 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Oct 27, 2025Updated 4 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year
- ☆15Nov 3, 2023Updated 2 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- ☆32Dec 19, 2025Updated 3 months ago
- ☆20Sep 8, 2019Updated 6 years ago
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆23Mar 1, 2025Updated last year
- ☆17Jan 27, 2022Updated 4 years ago
- Motorola S-Record to Binary File Converter (Python 3)☆11Jan 27, 2024Updated 2 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Mar 18, 2017Updated 9 years ago
- programmable e-paper tag with RFID☆10Jul 12, 2023Updated 2 years ago
- 一些我自己写的或者收集到的 小脚本☆16Nov 16, 2016Updated 9 years ago
- CodeQL library and queries for iterator invalidation☆22Mar 12, 2026Updated last week
- My experiments in understanding AES, Whitebox AES, and related attacks☆19Oct 11, 2020Updated 5 years ago
- A ImHex plugin to ask the almighty Oracle (OpenAI's Davinci AI) for help identifying file formats☆19Dec 4, 2022Updated 3 years ago
- 多元变量的线性回归——梯度下降(房价预测)☆18Apr 25, 2019Updated 6 years ago
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- ☆11Jan 9, 2019Updated 7 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- https://exploit.courses/☆19Apr 14, 2018Updated 7 years ago
- low cost software radio platform☆13Feb 14, 2021Updated 5 years ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆23Jan 3, 2025Updated last year