Clonewise - Detecting Package Clones and Inferring Security Vulnerabilities on Entire Linux Distributions.
☆25Feb 15, 2013Updated 13 years ago
Alternatives and similar repositories for Clonewise
Users that are interested in Clonewise are comparing it to the libraries listed below
Sorting:
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- This project equips Claude Code with advanced binary analysis capabilities for tasks such as incident response, malware investigation, a…☆34Nov 19, 2025Updated 3 months ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 6 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- ARCHIVE ONLY - THIS REPO HAS BEEN MOVED☆26Mar 29, 2018Updated 7 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- An extendable and flexible infrastructure for program instrumentation.☆25Feb 19, 2026Updated 2 weeks ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Jan 18, 2023Updated 3 years ago
- Statically assert that a program written in Rust does not panic☆23Feb 3, 2021Updated 5 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Jun 10, 2017Updated 8 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- ☆25Feb 12, 2015Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- ☆25Feb 2, 2026Updated last month
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Summary of static analysis in Java and C/C++☆18Aug 11, 2022Updated 3 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- polish fuzzy lop - fuzzer for libraries/APIs/*☆31Jul 30, 2025Updated 7 months ago
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 3 months ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Mar 2, 2026Updated last week
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Feb 18, 2020Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- Binary patching framework for Linux kernels☆48Jan 23, 2019Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Jul 30, 2016Updated 9 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- You can use it to modify HTTP (S) response values, redirect static file requests to the local file directory, and support batch modificat…☆18Nov 30, 2022Updated 3 years ago
- ☆14Feb 18, 2026Updated 2 weeks ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week