A flexible tool (CLI) for measuring the health of your source code
☆16Oct 13, 2024Updated last year
Alternatives and similar repositories for drtools-metric
Users that are interested in drtools-metric are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Mar 17, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Feb 20, 2021Updated 5 years ago
- ☆12Mar 31, 2026Updated last week
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- Jtag parsing scripts☆10Oct 14, 2023Updated 2 years ago
- Tizen ARM for Allwinner Devices☆28Apr 30, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated last year
- ☆15Mar 3, 2022Updated 4 years ago
- A generic decorator based ssh protocol message fuzzer based paramiko the Native Python SSHv2 protocol library☆13Jan 2, 2020Updated 6 years ago
- Braid/aggregate one or more RSS feeds (file or url) into a single feed (RSS or JSON output). Process resulting feed through specified plu…☆13Jun 27, 2018Updated 7 years ago
- ☆12May 31, 2018Updated 7 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆25Jan 23, 2026Updated 2 months ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆26Apr 2, 2026Updated last week
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆16Oct 19, 2022Updated 3 years ago
- ☆19Jan 25, 2017Updated 9 years ago
- FuzzCoAP - Fuzzing for Robustness and Security Testing of CoAP Servers☆12Jun 23, 2018Updated 7 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- ☆19Jun 25, 2025Updated 9 months ago
- Hackquest solutions.☆10Sep 29, 2015Updated 10 years ago
- https://exploit.courses/☆20Apr 14, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Claude Vault is a command-line tool that syncs your Claude AI conversations & Claude Code into beautifully formatted Markdown files that …☆57Mar 27, 2026Updated last week
- ☆27Mar 1, 2022Updated 4 years ago