Detect patterns of bad behavior in function calls
☆25Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for anselm
Users that are interested in anselm are comparing it to the libraries listed below
Sorting:
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- The Python Version of our Not Go-ing Anywhere Vulnerable Application☆11Jan 11, 2024Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- A quick and dirty Golang security talk☆27Apr 23, 2020Updated 5 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 7 months ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- A binary ninja plugin to detect crypto☆71Sep 22, 2023Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Safely execute an arbitrary x86 instruction☆205Feb 6, 2024Updated 2 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆171Mar 15, 2021Updated 4 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Mar 20, 2020Updated 5 years ago
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- ☆178Nov 25, 2018Updated 7 years ago
- PoC code using debugfs to store files in memory and execute them☆27May 25, 2018Updated 7 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Nov 24, 2021Updated 4 years ago
- A differential fuzzer for x86 decoders☆262Updated this week
- A collection of small hacks I wrote over the years☆36Feb 1, 2023Updated 3 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- NIST CSRC Cryptography Toolkit test vectors (unofficial and dumped to text)☆24Oct 6, 2018Updated 7 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago