trailofbits / differLinks
Detecting Inconsistencies in Feature or Function Evaluations of Requirements
☆68Updated last year
Alternatives and similar repositories for differ
Users that are interested in differ are comparing it to the libraries listed below
Sorting:
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆124Updated 3 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- Generate (message) sequence diagrams from TLA+ state traces☆74Updated 3 years ago
- LD_PRELOADable library for exploring the glibc heap☆108Updated 10 months ago
- Visualize binary files☆132Updated 4 months ago
- Run the rr debugger in a Linux VM on apple silicon macOS or in the cloud. Use the rr debugger without HW performance counters on x86-64 a…☆98Updated 2 months ago
- An introduction to temporal logic and how it can be used to analyze concurrency☆108Updated 2 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- A web fuzzer using the httpipe format☆98Updated last year
- Library sandboxing for the Verona research language and usable in other contexts.☆51Updated 2 years ago
- CTADL is a static taint analysis tool☆50Updated 5 months ago
- Fleur implements a Bloom Filter library in C that is fully compatible with DCSO's Go and python implementations.☆117Updated 2 years ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆104Updated 2 years ago
- gradient-based symbolic execution engine implemented from scratch☆36Updated 2 years ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Testing platform for covert data exfiltration techniques where sensitive documents are embedded into vector representations and tunneled …☆67Updated last week
- HPC research and demonstrations☆113Updated last month
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆83Updated 3 years ago
- VSCode LLVM Compiler Explorer☆235Updated last year
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆127Updated last month
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆137Updated 3 years ago
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆94Updated last week
- A Low Barrier Proof Assistant☆153Updated this week
- Blessed sanctum, save us || Sanctum is a small, reviewable, capable, pq-secure and fully privilege seperated VPN daemon. || This is a rea…☆92Updated last week
- Scorpi - A Modern Hypervisor (for macOS)☆91Updated 10 months ago
- create local malicious git repo☆51Updated 10 months ago
- Use LLMs to rank anything.☆109Updated this week
- A RISC-V emulator built with ClickHouse SQL☆52Updated last month
- A static analysis file format checker.☆268Updated 5 years ago