readevalprint / sneklangView external linksLinks
A sandboxed Python subset for safe evaluation
☆32Jun 28, 2022Updated 3 years ago
Alternatives and similar repositories for sneklang
Users that are interested in sneklang are comparing it to the libraries listed below
Sorting:
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- an Internet Key Exchange V2 library in go☆12Jul 7, 2017Updated 8 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40May 3, 2014Updated 11 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- Exploiting HID VertX and EDGE access control systems☆24Jan 17, 2017Updated 9 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- SELinux Policy Analysis Tools v3☆70Mar 23, 2015Updated 10 years ago
- Scan pypi for typosquatting☆38Jan 23, 2023Updated 3 years ago
- Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes yo…☆173Jan 31, 2013Updated 13 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- jann - configuration deployment tool for *nix☆37Dec 25, 2019Updated 6 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Binary Ninja Function Annotator☆40Feb 20, 2019Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- Bootstrap LEMP WrodPress on virtual machine use VagrantFile.☆12Dec 14, 2017Updated 8 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Prework for GreyAtom's Full Stack Data Science Engineering Program☆12Jun 21, 2017Updated 8 years ago
- LaTeX 入门讲座资料☆10Sep 29, 2019Updated 6 years ago
- ☆10May 4, 2020Updated 5 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Feb 16, 2019Updated 6 years ago