☆23Apr 7, 2022Updated 4 years ago
Alternatives and similar repositories for iot-security
Users that are interested in iot-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust and C Benchmarks☆14Nov 21, 2024Updated last year
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Source code of ASAN--☆105Jun 18, 2024Updated last year
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- ☆148Oct 26, 2024Updated last year
- ☆10Sep 28, 2020Updated 5 years ago
- Some good ctf challenge☆11Mar 23, 2019Updated 7 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- A V8 Sandbox Escape Technique.☆34Jul 4, 2024Updated last year
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- A framework for streamlining the capture of PANDA execution traces.☆57Jun 16, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Aug 12, 2022Updated 3 years ago
- Exploits for TRENDNet routers☆14Apr 21, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆31May 28, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆344Dec 12, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- A python framework for Optimal Planning Modulo Theories☆12Jan 26, 2024Updated 2 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- Template for NSF Proposals☆17Oct 28, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆26Apr 13, 2022Updated 4 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- ☆11May 17, 2021Updated 4 years ago
- Automatic Exploit Generation Paper☆87Dec 12, 2021Updated 4 years ago
- Polished example scripts for controlling Tektronix equipment using VISA☆13Mar 21, 2018Updated 8 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆31Nov 4, 2023Updated 2 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- in-toto Enhancements☆20Feb 17, 2025Updated last year
- 主要修复newbing回复被微软过滤器拦截的问题,目前可以成功阻止微软拦截撤回文字消息。dev-qq分支增加qq图片发送支持。欢迎PR!☆10May 12, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- IDA PRO signature files that can be used in reversing the iPhone baseband. On an iPhone 4 firmware can pickup upto 800 functions when al…☆27May 15, 2012Updated 13 years ago
- ☆12Apr 5, 2019Updated 7 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 10 months ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆14Nov 11, 2022Updated 3 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- An implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago