necst / CANflict
☆16Updated 2 years ago
Alternatives and similar repositories for CANflict:
Users that are interested in CANflict are comparing it to the libraries listed below
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- ☆21Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆45Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated last year
- PoC code and tools for Black Hat USA 2024☆21Updated 8 months ago
- ☆18Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- ☆16Updated 9 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- ☆12Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- A MBR Fuzzer☆29Updated last year
- CANvas is a fast and inexpensive automotive network mapper that can serve as a basis for many other security applications.☆28Updated 4 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 3 months ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆60Updated 3 weeks ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆11Updated 3 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 3 years ago
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆15Updated last week
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆21Updated 2 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆12Updated 3 weeks ago
- Diaphora Machine Learning tools and datasets☆20Updated 6 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆11Updated 5 months ago
- ☆20Updated 6 months ago
- ☆27Updated 3 years ago