exploit vulnerable c/c++ programms with buffer overflow attacks
☆24Jul 18, 2022Updated 3 years ago
Alternatives and similar repositories for buffer-overflow
Users that are interested in buffer-overflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆12Mar 23, 2024Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 12 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- The source code of Disconnected Emerging Knowledge Graph Oriented Inductive Link Prediction☆10May 6, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 基于Python爬虫的CNNVD漏洞信息监控脚本——Cnnvd_monitor,实现了对CNNVD官网平台的实时监控、数据获取、入库、并用微信进行实时推送、并将获取的数据进行Web端表格展示。☆15Aug 9, 2021Updated 4 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆47Apr 28, 2021Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Code and Data for DeepLog system☆17Feb 16, 2023Updated 3 years ago
- Detect semantically similar python code using fine-tuned GraphCodeBERT model.☆16Jan 23, 2023Updated 3 years ago
- Contextual LSTM for NLP tasks like word prediction and word embedding creation for Deep Learning☆28Apr 25, 2019Updated 7 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Jan 27, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Dataset and sample code for the paper "A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software"☆28Feb 19, 2019Updated 7 years ago
- ILANDS Sensor traffic data analysis software packages☆10Apr 9, 2026Updated 3 weeks ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆24Apr 30, 2016Updated 10 years ago
- A Firefox add-on that warns about changing certificates☆12Dec 1, 2019Updated 6 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 8 years ago