A framework for automated vulnerability discovery in SDNs
☆23Aug 4, 2018Updated 7 years ago
Alternatives and similar repositories for BEADS
Users that are interested in BEADS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 11 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- ☆22Aug 29, 2025Updated 8 months ago
- Automatically exported from code.google.com/p/hf-2011☆15Feb 12, 2016Updated 10 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 6 years ago
- Kills connections by process ID☆11Oct 21, 2018Updated 7 years ago
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆18Apr 4, 2017Updated 9 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆20Sep 1, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collection of resources about Virtualization☆10Nov 14, 2019Updated 6 years ago
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆14Feb 27, 2023Updated 3 years ago
- ☆15Apr 4, 2019Updated 7 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Sep 21, 2018Updated 7 years ago
- 文件透明过滤驱动☆15Mar 31, 2013Updated 13 years ago
- OVAL Interpreter☆14Sep 14, 2020Updated 5 years ago
- ☆17Dec 4, 2018Updated 7 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- YI JIAN SAN LIAN!!!☆18Apr 25, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆10Aug 18, 2021Updated 4 years ago
- Simple Windows update manager with WUA API and Dear ImGui.☆17Sep 26, 2020Updated 5 years ago
- Ethereum VM Contract Simulator☆16Apr 13, 2026Updated 3 weeks ago
- ☆16Feb 24, 2015Updated 11 years ago
- A complete bomberman game with heights, AI in lua, and shaders.☆11Jun 26, 2021Updated 4 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- ☆11Jun 28, 2020Updated 5 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- Safed for Linux☆14Jul 5, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 简单的二进制加密壳☆12Aug 2, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆17Apr 13, 2026Updated 3 weeks ago
- csie.ctf.tw☆15Jan 13, 2017Updated 9 years ago
- Find your router's default password☆14Apr 7, 2015Updated 11 years ago
- CBench, wrapped in stuff that makes it useful.☆20Oct 1, 2015Updated 10 years ago
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago