trailofbits / not-slithering-anywhereLinks
The Python Version of our Not Go-ing Anywhere Vulnerable Application
☆11Updated last year
Alternatives and similar repositories for not-slithering-anywhere
Users that are interested in not-slithering-anywhere are comparing it to the libraries listed below
Sorting:
- poststructural fuzzing☆31Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Database☆22Updated 2 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆26Updated 7 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- A Python library for easy and fast program transformation/repair☆15Updated 4 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- A set of vulnerable Golang programs☆179Updated 2 years ago
- Example Manticore scripts☆68Updated last year
- How fast can we brute force a 64-bit comparison?☆54Updated 5 years ago
- CodeQL library and queries for iterator invalidation☆22Updated 4 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- ☆21Updated 2 months ago
- Regexp based tool for mutating generic source code across numerous languages☆147Updated last year
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Updated last year
- A list of C static analysis tools☆12Updated 8 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis results☆38Updated last month
- Corpus of crypto formats☆12Updated 2 years ago
- CTADL is a static taint analysis tool☆49Updated 2 months ago
- A user-first approach to threat modeling.☆19Updated 6 months ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 5 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- ☆82Updated 2 months ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Updated 6 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago