☆14May 30, 2022Updated 3 years ago
Alternatives and similar repositories for symbexcel
Users that are interested in symbexcel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Aug 7, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆122Mar 10, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆19Dec 30, 2024Updated last year
- ☆16Apr 15, 2019Updated 6 years ago
- 自己调的网络☆11Sep 5, 2019Updated 6 years ago
- convert luac to lua source☆11Dec 20, 2024Updated last year
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- 微信聊天记录分析器☆12Apr 22, 2022Updated 3 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- Instrumented ARM kernel☆15Oct 16, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆62Mar 4, 2026Updated 3 weeks ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- idax: IDASDK extension libraries☆23Oct 12, 2025Updated 5 months ago
- Lua Decompiler for lua 5.1 , 5.2 and 5.3☆30Mar 4, 2024Updated 2 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Generic and transparent TLS inspection for local programs☆25Oct 24, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆17Nov 24, 2020Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- A script to fetch today new update cve info☆22Jul 2, 2020Updated 5 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Library and tools to access the Mac OS disk image formats☆22Dec 18, 2025Updated 3 months ago
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆26Sep 11, 2020Updated 5 years ago
- Tool to measure code coverage of Android applications when their source code is not available☆12Apr 1, 2023Updated 2 years ago
- ☆10Mar 31, 2022Updated 3 years ago
- Binary exploitation by confusing the unwinder☆68Mar 9, 2023Updated 3 years ago
- ☆20Jul 16, 2024Updated last year
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 3 years ago