securisec / glorifiedgrepLinks
Static code search python lib
☆18Updated 5 years ago
Alternatives and similar repositories for glorifiedgrep
Users that are interested in glorifiedgrep are comparing it to the libraries listed below
Sorting:
- Static Token And Credential Scanner☆95Updated 2 years ago
- Telco training☆26Updated 7 years ago
- Yet Another YARA rule Generator☆65Updated 7 years ago
- PDML importer for Burp Suite☆28Updated 5 years ago
- Polyglot detector☆23Updated 8 months ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 7 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Updated 3 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆13Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 7 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago