trailofbits / not-slithering-anywhereLinks
The Python Version of our Not Go-ing Anywhere Vulnerable Application
☆11Updated last year
Alternatives and similar repositories for not-slithering-anywhere
Users that are interested in not-slithering-anywhere are comparing it to the libraries listed below
Sorting:
- poststructural fuzzing☆31Updated 5 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆27Updated 6 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Database☆22Updated 2 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Example Manticore scripts☆68Updated last year
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- CodeQL library and queries for iterator invalidation☆22Updated 4 years ago
- A Python library for easy and fast program transformation/repair☆15Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Regexp based tool for mutating generic source code across numerous languages☆141Updated 11 months ago
- A set of vulnerable Golang programs☆177Updated 2 years ago
- Hierarchical Delta Debugging Framework☆59Updated 6 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- A sample PoC for container-aware exec events for osquery☆24Updated last year
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- ☆11Updated 4 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Code to fuzz bignum libraries☆46Updated 6 years ago
- White-box cryptography based on FAPKC algorithm☆26Updated 5 months ago
- ☆82Updated 9 months ago
- A cookiecutter template for a best-practices Python project☆16Updated last week
- A user-first approach to threat modeling.☆17Updated 2 months ago
- Static analysis framework for EVM bytecode☆30Updated 5 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- ☆19Updated 5 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago