makecfg is a tool for making CFG(Control Flow Graph) from binary.
☆18Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for malgrapher
Users that are interested in malgrapher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecHack365 非公式 ファンページ☆11Jun 14, 2024Updated last year
- hands-on to implement simple network load balancer using XDP☆26Nov 29, 2023Updated 2 years ago
- Restoring room images from virtual background images☆44Oct 8, 2021Updated 4 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Jan 17, 2023Updated 3 years ago
- Stack-based Buffer Overflow - Vulnerable binaries and exploit samples for pwnable beginners☆18Jun 24, 2021Updated 4 years ago
- ペネトレーションテストについて☆75Aug 12, 2021Updated 4 years ago
- The Depth programming language☆26Dec 31, 2019Updated 6 years ago
- Kubernetes CNI plugin and network load-balancer by Rust☆17Jun 26, 2024Updated last year
- all-gem runs various versions of command provided by gem.☆10Jan 4, 2022Updated 4 years ago
- A Quine of Next.js app https://nextjs-quine.vercel.app/☆12Mar 25, 2021Updated 5 years ago
- linux block filter driver☆15Oct 21, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Sandboxie应用层Hook框架方案☆22Jan 26, 2025Updated last year
- a backdoor detection tool for Ethereum ERC token contract☆12Jun 17, 2022Updated 3 years ago
- Hindley-Milner Type Inference☆12Dec 29, 2019Updated 6 years ago
- The corpus of Japanese spam messages of invitation Mama Katu.☆42Aug 1, 2025Updated 8 months ago
- ☆11Jul 9, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Code for KekuleScope☆11Nov 22, 2022Updated 3 years ago
- ☆13Dec 11, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fakeshellは仮想的なシェル環境を提供するパッケージです。☆14Jan 17, 2023Updated 3 years ago
- Interactive Control Flow Graph Visualization.☆34Sep 27, 2021Updated 4 years ago
- Samples for https://github.com/igaiga/rails_textbook☆15Oct 15, 2025Updated 5 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated this week
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- Delete your 2 or more days ago tweets Automatically.☆31Apr 2, 2026Updated last week
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆256Mar 23, 2026Updated 2 weeks ago
- A Survey of Deep Learning Models for Structural Code Understanding☆21May 12, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Jul 8, 2018Updated 7 years ago
- WebAPI of shokujinjp☆15Aug 9, 2025Updated 8 months ago
- ☆45Mar 13, 2022Updated 4 years ago
- Compute Sanitizer but it's powered by SPIR-V☆17Aug 15, 2025Updated 7 months ago
- ☆18Sep 23, 2024Updated last year
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- ☆26Oct 25, 2022Updated 3 years ago