source code analysis workshop
☆17Mar 7, 2021Updated 5 years ago
Alternatives and similar repositories for sca-workshop
Users that are interested in sca-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Aug 16, 2021Updated 4 years ago
- 安卓工程师进阶之路☆27Aug 4, 2020Updated 5 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- Multi-threading brainfuck compiler☆11Dec 10, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- VPP SRv6 lab with Honeycomb and Ligato☆17Oct 30, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆45Apr 12, 2022Updated 4 years ago
- ☆38Nov 16, 2023Updated 2 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- dijkstra algorithm optimized with heap☆14Dec 20, 2018Updated 7 years ago
- Realize The Automation of UAV Cluster by Reinforcement Learning Approach☆12May 21, 2018Updated 7 years ago
- A Wireshark dissector for the Apple Remote Invocation (ARI) protocol, used between Intel base band chips and the iOS CommCenter for vario…☆65Sep 19, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆126Sep 3, 2021Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆97Oct 28, 2021Updated 4 years ago
- ☆36Aug 25, 2021Updated 4 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- ☆54Apr 4, 2026Updated 3 weeks ago
- DARPA's Automated Rapid Certification of Software (ARCOS) project called Rapid Assurance Curation Kit (RACK)☆21Mar 13, 2026Updated last month
- ☆10Feb 8, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A xss target for practicing☆10Feb 22, 2017Updated 9 years ago
- Fuzzer targeting Android's IPC☆15Oct 2, 2015Updated 10 years ago
- A "safe way" to do man-in-the-middle attack test, without using ARP attack.☆10Jun 2, 2021Updated 4 years ago
- Jeb3 Demo (include mips && arm64 && elf && pe && wasm decompiler) without limit☆18Jul 11, 2019Updated 6 years ago
- PoC CVE-2021-30632 - Out of bounds write in V8☆74Sep 20, 2021Updated 4 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- ☆102Sep 12, 2021Updated 4 years ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆181May 19, 2025Updated 11 months ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆46Jan 23, 2022Updated 4 years ago
- CTF challenge and Writeup☆13Apr 11, 2019Updated 7 years ago
- Some Proof-of-Concepts of bugs I found☆45Aug 26, 2019Updated 6 years ago
- GIoU loss simple example☆16Mar 26, 2019Updated 7 years ago
- Yet another IPython notebook to LaTeX converter - this one exports clean code easily absorbed in other reports.☆16Jun 1, 2023Updated 2 years ago
- ☆34Apr 7, 2022Updated 4 years ago
- Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation☆17Dec 3, 2020Updated 5 years ago