An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LLVM) and binary analysis (angr).
☆24Jul 1, 2022Updated 3 years ago
Alternatives and similar repositories for lightblue
Users that are interested in lightblue are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 10, 2021Updated 4 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- ☆11Apr 7, 2022Updated 4 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆23Apr 7, 2022Updated 4 years ago
- Abstraction layer for Xilinx FPGAs☆15Aug 9, 2019Updated 6 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆38Nov 27, 2024Updated last year
- ☆25Oct 4, 2018Updated 7 years ago
- University of Queensland Binary Translation framework☆26Mar 11, 2019Updated 7 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Oct 2, 2022Updated 3 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Diary of a reverse-engineer blog☆20Oct 2, 2023Updated 2 years ago
- ☆33Sep 11, 2018Updated 7 years ago
- Project FlowCog (2017)☆27Aug 23, 2018Updated 7 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- ☆37May 19, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Challenge binaries (CBs) and tools from DARPA's Cyber Grand Challenge (CGC)☆20Feb 21, 2022Updated 4 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- a tool for CoreDump☆14Oct 21, 2017Updated 8 years ago
- ☆14Jun 2, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- ☆12Sep 12, 2020Updated 5 years ago
- ☆39Feb 15, 2022Updated 4 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆31Nov 4, 2023Updated 2 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago