trailofbits / differ
Detecting Inconsistencies in Feature or Function Evaluations of Requirements
☆67Updated last year
Alternatives and similar repositories for differ:
Users that are interested in differ are comparing it to the libraries listed below
- Generate (message) sequence diagrams from TLA+ state traces☆73Updated 2 years ago
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆104Updated 2 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated 11 months ago
- LD_PRELOADable library for exploring the glibc heap☆104Updated last month
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆104Updated this week
- ANIL(A Nice Intermediate Language) Python & C++ inspired programming language that transpiles to C and can be embedded within C source fi…☆54Updated last week
- An introduction to temporal logic and how it can be used to analyze concurrency☆105Updated last year
- a web fuzzer using the httpipe format☆100Updated last year
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆75Updated 3 months ago
- Visualize binary files☆130Updated 2 weeks ago
- gradient-based symbolic execution engine implemented from scratch☆35Updated last year
- Run the rr debugger in a Linux VM on aarch64 macOS or in the cloud -- Use the rr debugger without HW performance counters !☆62Updated 2 weeks ago
- Build better base images☆69Updated this week
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 3 weeks ago
- create local malicious git repo☆50Updated 3 weeks ago
- Code Pathfinder, the open-source alternative to GitHub CodeQL built with GoLang. Built for advanced structural search, derive insights, f…☆58Updated this week
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- A Unikernel running WebAssembly code☆50Updated 2 years ago
- Beating the `bisect` module's implementation using C-extensions.☆30Updated last year
- Dogma: A modernized metalanguage with better expressiveness and binary grammar support☆64Updated last year
- A static analysis file format checker.☆239Updated 4 years ago
- Lamport's Bakery Algorithm Demonstrated in Python☆96Updated last year
- Fleur implements a Bloom Filter library in C that is fully compatible with DCSO's Go and python implementations.☆117Updated 2 years ago
- Library sandboxing for the Verona research language and usable in other contexts.☆46Updated last year
- A framework for streamlining the capture of PANDA execution traces.☆56Updated 4 years ago
- An Elliptic-Curve Based Secure Chat, written using Rust and Protobuf!☆52Updated 7 months ago
- A probabilistic approximate DNF counter☆36Updated last year
- immutable backups so simple that unborkable☆55Updated 5 months ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆103Updated last year