trailofbits / not-slithering-anywhereLinks
The Python Version of our Not Go-ing Anywhere Vulnerable Application
☆11Updated last year
Alternatives and similar repositories for not-slithering-anywhere
Users that are interested in not-slithering-anywhere are comparing it to the libraries listed below
Sorting:
- poststructural fuzzing☆31Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Database☆22Updated 2 years ago
- A Python library for easy and fast program transformation/repair☆15Updated 4 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- Regexp based tool for mutating generic source code across numerous languages☆149Updated last year
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- Example Manticore scripts☆68Updated 2 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆26Updated 7 years ago
- CodeQL library and queries for iterator invalidation☆22Updated 4 years ago
- Corpus of crypto formats☆12Updated 3 years ago
- A set of vulnerable Golang programs☆179Updated 2 years ago
- Hierarchical Delta Debugging Framework☆59Updated 3 weeks ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Corpora used to seed NSS' fuzzing targets☆10Updated this week
- ☆82Updated 4 months ago
- Measure branching along code paths☆19Updated 9 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 5 years ago
- How fast can we brute force a 64-bit comparison?☆54Updated 6 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Google Protocol Buffers message generator☆283Updated 3 weeks ago
- Static analysis framework for EVM bytecode☆31Updated 5 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆32Updated 2 years ago
- Find the ideal fuzz targets in a Rust codebase☆222Updated last month
- Tools for power measurements of post-quantum cryptographic algorithms☆30Updated 6 years ago
- A list of C static analysis tools☆12Updated 8 years ago
- A set of templates for different academic venues.☆29Updated 6 years ago
- Designing Secure Cryptography☆22Updated 6 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago