☆32Feb 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for emb3d
Users that are interested in emb3d are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 9 months ago
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- ☆21Sep 10, 2024Updated last year
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- Official implementation of the paper "HermesBDD: A Multi-Core and Multi-Platform Binary Decision Diagram Package" accepted @ DDECS 2023.☆13Jul 11, 2025Updated 8 months ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- ☆43Dec 3, 2025Updated 3 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- yara and radare2, better together☆27Updated this week
- ☆25Aug 6, 2025Updated 7 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- egui library for displaying control flow graphs using petgraph, and rust sugiyama.☆36Dec 28, 2025Updated 2 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- A bunch of reverse engineering Binaries dedicated to practice.☆17Feb 14, 2026Updated last month
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- program analysis for machine code☆37Oct 26, 2021Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- ☆16Updated this week
- Mirror to the official CH341A drivers and used software, along with the documentation.☆14Aug 26, 2022Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Library for forward-error-correction with Reed-Solomon codes☆13Jul 3, 2020Updated 5 years ago
- A Yocto meta-layer for generating CycloneDX SBOMs☆23Updated this week
- A library for parsing and comparing software version numbers.☆31Nov 21, 2025Updated 4 months ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆44Updated this week
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago