State-based Network AttacK Explorer (SNAKE) code
☆14Sep 6, 2019Updated 6 years ago
Alternatives and similar repositories for snake
Users that are interested in snake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A system for automated discovery of congestion control attacks on TCP implementations☆19Aug 21, 2018Updated 7 years ago
- ☆11Oct 10, 2023Updated 2 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- Dlink DIR 615 Exploit☆19Jun 1, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A list of publications on the use of crowdsourcing in software engineering☆18Sep 10, 2016Updated 9 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- Test runner that produces standard junit XML output file☆23Aug 3, 2016Updated 9 years ago
- ☆12May 9, 2017Updated 8 years ago
- Formalisation of a capability machine and principles for reasoning about security properties☆26Mar 12, 2026Updated 2 weeks ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- ☆28Mar 10, 2024Updated 2 years ago
- Build system, written in Python☆17Dec 20, 2014Updated 11 years ago
- PRINCESS source code☆11Oct 15, 2016Updated 9 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- Temporal graph storage in rust☆13Apr 26, 2023Updated 2 years ago
- Papers I (+ collaborators) have written or am currently writing☆20Jan 15, 2018Updated 8 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆28Feb 21, 2024Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Java fuzz testing library for implementations of ABNF rules such as IETF RFCs☆34Sep 26, 2024Updated last year
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Having issues with the IBM Blockchain Bluemix service? Let us know!☆13Aug 8, 2016Updated 9 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- Docker images for the IBM Blockchain Platform☆16Mar 5, 2018Updated 8 years ago
- ☆12Dec 20, 2022Updated 3 years ago
- GO2Sum is a deep learning based summarizer that generates human-readable summaries for GO term annotations made by protein function predi…☆16Mar 27, 2024Updated 2 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- tool of llm-based indirect-call analyzer☆30Feb 18, 2025Updated last year
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago