Detect patterns of bad behavior in function calls
☆25Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for anselm
Users that are interested in anselm are comparing it to the libraries listed below
Sorting:
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Library to manipulate and create Sourcetrail databases☆23May 27, 2025Updated 9 months ago
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- ☆11Sep 26, 2019Updated 6 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Jan 9, 2018Updated 8 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ☆26Jul 8, 2015Updated 10 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Perform multi-party computation on machine learning applications☆22Jun 21, 2022Updated 3 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago
- ☆26Mar 12, 2020Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆205Feb 6, 2024Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- A differential fuzzer for x86 decoders☆265Updated this week
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- A LLVM-based toolchain for Linux designed to build a portable osquery☆41Mar 12, 2026Updated last week
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- A binary ninja plugin to detect crypto☆72Sep 22, 2023Updated 2 years ago
- A kernelspace syscall interceptor and randomized faulter☆358Nov 18, 2024Updated last year
- ☆16Jul 9, 2019Updated 6 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago