PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning
☆13Sep 8, 2020Updated 5 years ago
Alternatives and similar repositories for PMP
Users that are interested in PMP are comparing it to the libraries listed below
Sorting:
- Fair Android Explorer☆22Apr 19, 2023Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- cross-architecture static library detector for IoT malware☆43Jan 7, 2026Updated last month
- ☆91Oct 25, 2021Updated 4 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- ATP: Directed Graph Embedding with Asymmetric Transitivity Preservation☆10Apr 18, 2019Updated 6 years ago
- ☆18Nov 7, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆11May 19, 2022Updated 3 years ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- The CompCert formally-verified C compiler☆10Feb 25, 2026Updated last week
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- ☆11Apr 10, 2018Updated 7 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 5 months ago
- ☆12Apr 23, 2021Updated 4 years ago
- ☆21Dec 25, 2025Updated 2 months ago
- library to load and parse Mach-O core files without dependencies☆17Oct 4, 2021Updated 4 years ago
- ☆11Aug 24, 2023Updated 2 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 3 weeks ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- ☆13Mar 20, 2025Updated 11 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- Code for paper "W-RAG: Weakly Supervised Dense Retrieval in RAG for Open-domain Question Answering"☆15Oct 2, 2025Updated 5 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Jun 21, 2021Updated 4 years ago
- A Natural Language Generation System☆14Feb 17, 2024Updated 2 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- The TacTok automated Coq proof script synthesis tool☆17Jan 9, 2024Updated 2 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 4 months ago
- 数据结构课堂作业+大作业+计组部分+MATLAB部分☆10Jul 4, 2018Updated 7 years ago