☆14Dec 22, 2015Updated 10 years ago
Alternatives and similar repositories for polygraph
Users that are interested in polygraph are comparing it to the libraries listed below
Sorting:
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- C++ template meta-programmable framework for authoring Pintools☆37Apr 1, 2020Updated 5 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 10 months ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Jan 23, 2014Updated 12 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- bdldr is an unofficial engine loader for Bitdefender ® for Linux☆45Mar 12, 2016Updated 9 years ago
- ☆11Aug 14, 2014Updated 11 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- ☆11Oct 13, 2025Updated 4 months ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- A Gephi plugin for community detection in dynamic networks☆12Jan 14, 2014Updated 12 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last week
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 3 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- LuaJIT iOS Framework script - old don't use this☆28Sep 5, 2013Updated 12 years ago
- ☆11Sep 29, 2019Updated 6 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- ☆11May 2, 2019Updated 6 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Auto Encoder on Tensorflow☆12Oct 18, 2017Updated 8 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Research tools for understanding the insides of HBOOT☆19May 13, 2013Updated 12 years ago