secgroup / fwsLinks
Language-independent Synthesis of Firewall Policies
☆25Updated 2 years ago
Alternatives and similar repositories for fws
Users that are interested in fws are comparing it to the libraries listed below
Sorting:
- Mignis is a semantic based tool for firewall configuration.☆42Updated 6 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆41Updated 4 years ago
- Tools for timing attacks☆18Updated 9 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- ☆43Updated 3 years ago
- The BAP tutorial☆72Updated 2 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 7 months ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆68Updated 11 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- Experimental translation of llvm to smt.☆56Updated 5 years ago
- ☆23Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- An opinionated tool to create amazing presentations☆36Updated 2 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Differential fuzzing for the masses!☆152Updated 7 years ago
- A collection of ready to use binary analysis tools☆59Updated last year
- CRETE under development☆59Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated 8 months ago
- ☆35Updated 8 years ago
- ☆63Updated 9 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago