Source-binary patch presence test system.
☆27Mar 21, 2020Updated 5 years ago
Alternatives and similar repositories for fiber
Users that are interested in fiber are comparing it to the libraries listed below
Sorting:
- Source-binary patch presence test system.☆84Jun 23, 2022Updated 3 years ago
- My notebook about the study of IoT Home Security.☆18Feb 27, 2020Updated 6 years ago
- Instruction decoder microbenchmark suite☆11Oct 31, 2017Updated 8 years ago
- red or blue☆14Apr 20, 2023Updated 2 years ago
- Exploits from the Finding and Preventing Bugs in JavaScript Bindings paper☆10May 22, 2017Updated 8 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- 🔨Reverse Shell 备忘录☆16Apr 2, 2020Updated 5 years ago
- PoC of CVE-2022-20474☆19Feb 3, 2025Updated last year
- Line counting and language identification tool☆18Apr 26, 2023Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Nov 21, 2022Updated 3 years ago
- RPM/SWID vulnerability scanner☆23Mar 19, 2021Updated 4 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated last month
- Fuzz targets for OSS-Fuzz☆25May 9, 2018Updated 7 years ago
- ☆164Oct 6, 2021Updated 4 years ago
- The SearchRepair automated C program repair tool (see http://people.cs.umass.edu/~brun/pubs/pubs/Ke15ase.pdf)☆27Mar 13, 2019Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Jan 27, 2017Updated 9 years ago
- a Machine Learning powered CSRF attacks finding tool☆27Mar 8, 2019Updated 6 years ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- ☆27Oct 21, 2016Updated 9 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Jun 25, 2021Updated 4 years ago
- ☆25Apr 6, 2018Updated 7 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Jan 23, 2018Updated 8 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- ☆12Aug 15, 2024Updated last year
- This is a mirror of the main Bitbucket repository. Issue tracking is done on Bitbucket☆12Jun 29, 2022Updated 3 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Jul 8, 2018Updated 7 years ago