☆23Apr 7, 2022Updated 3 years ago
Alternatives and similar repositories for iot-security
Users that are interested in iot-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Source code of ASAN--☆104Jun 18, 2024Updated last year
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago
- ☆22Jul 25, 2024Updated last year
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- ☆146Oct 26, 2024Updated last year
- ☆10Sep 28, 2020Updated 5 years ago
- Some good ctf challenge☆11Mar 23, 2019Updated 7 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- ☆48Nov 15, 2021Updated 4 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- A framework for streamlining the capture of PANDA execution traces.☆57Jun 16, 2020Updated 5 years ago
- ☆11Aug 12, 2022Updated 3 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆31May 28, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- CaDiCaL + neural glue variable predictions☆10Oct 21, 2020Updated 5 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆12Nov 11, 2015Updated 10 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- Template for NSF Proposals☆16Oct 28, 2025Updated 4 months ago
- ☆26Apr 13, 2022Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- 主要修复newbing回复被微软过滤器拦截的问题,目前可以成功阻止微软拦截撤回文字消息。dev-qq分支增加qq图片发送支持。欢迎PR!☆10May 12, 2023Updated 2 years ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- IDA PRO signature files that can be used in reversing the iPhone baseband. On an iPhone 4 firmware can pickup upto 800 functions when al…☆27May 15, 2012Updated 13 years ago
- ☆12Apr 5, 2019Updated 6 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago