☆23Apr 7, 2022Updated 3 years ago
Alternatives and similar repositories for iot-security
Users that are interested in iot-security are comparing it to the libraries listed below
Sorting:
- CaDiCaL + neural glue variable predictions☆10Oct 21, 2020Updated 5 years ago
- A python framework for Optimal Planning Modulo Theories☆12Jan 26, 2024Updated 2 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- Rust and C Benchmarks☆14Nov 21, 2024Updated last year
- ☆10Jan 30, 2022Updated 4 years ago
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Some good ctf challenge☆11Mar 23, 2019Updated 6 years ago
- ☆20May 27, 2020Updated 5 years ago
- ☆22Dec 2, 2022Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- ☆145Oct 26, 2024Updated last year
- ☆22Jul 25, 2024Updated last year
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- PDDL planner interface for PDDLGym.☆35Jul 22, 2025Updated 7 months ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- A design automation framework to engineer decision diagrams yourself☆26Feb 25, 2026Updated last week
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- This is a Login application for Android using Parse server.☆10Nov 26, 2018Updated 7 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆36Mar 3, 2021Updated 5 years ago
- Phoenix Framework Project☆42Oct 6, 2021Updated 4 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- Scripts for Digital Design flow control.☆16Oct 30, 2025Updated 4 months ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 不定期更新爬取各国网站的爬虫源码☆10Aug 15, 2018Updated 7 years ago
- A copy of the latest version of MVSIS☆12Apr 18, 2021Updated 4 years ago
- ELVE : ELVE Logic Visualization Engine☆11Jul 2, 2017Updated 8 years ago