Collections of student projects to find execution path in binary program via taint analysis using Ghidra
☆17Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for source-sink-ghidra
Users that are interested in source-sink-ghidra are comparing it to the libraries listed below
Sorting:
- ☆12Jul 5, 2024Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- CEH V11 Notes stay tuned and fork me. All the best for your exams 👍💯💥☆11Dec 1, 2021Updated 4 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- Music Player app built using 100% Kotlin☆11Aug 4, 2023Updated 2 years ago
- A practical fuzzing tool for SMT solvers☆11Nov 26, 2025Updated 3 months ago
- Android library for recognizing java classes and methods based on their signatures☆10Mar 18, 2020Updated 5 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- 漏洞复现,exp、poc收集整理☆11Jun 4, 2021Updated 4 years ago
- ECMAScript AST query library.☆12Jul 7, 2020Updated 5 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- ☆11Jul 23, 2015Updated 10 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆11Apr 15, 2020Updated 5 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Android 脱壳☆14Mar 23, 2022Updated 3 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Go语言实现命令行版飞秋☆13Nov 26, 2018Updated 7 years ago
- 利用nginx+flask搭建自有微博平台,并展示平台中消息扩散过程及演化过程☆10Jul 28, 2015Updated 10 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Sources of MTK FirmwareAdapter Tool, now on GitHub☆13Oct 15, 2015Updated 10 years ago
- ☆13May 9, 2023Updated 2 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- OxiZ is a high-performance Satisfiability Modulo Theories (SMT) solver written entirely in Rust. This project is part of an initiative to…☆40Feb 27, 2026Updated last week
- (1) Find definition + Code mining + File processing via menu/mouse/terminal in vscode or command out-of vscode. (2) Vscode + other IDEs +…☆11Updated this week
- ☆11Dec 25, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- basic ADB core for python using TCP☆19Dec 20, 2013Updated 12 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆13Feb 22, 2024Updated 2 years ago