Reverse engineering tool using bioinformatics sequence alignment algorithms
☆26Mar 5, 2021Updated 5 years ago
Alternatives and similar repositories for protocol-informatics
Users that are interested in protocol-informatics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- “Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "…☆51Apr 7, 2018Updated 7 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Community detection algorithms☆11Sep 2, 2016Updated 9 years ago
- Protocol Inspection and State Machine Analysis☆23May 26, 2018Updated 7 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- FuzzCoAP - Fuzzing for Robustness and Security Testing of CoAP Servers☆12Jun 23, 2018Updated 7 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- A go parser for the collectd binary protocol☆13Mar 21, 2016Updated 10 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Patches to the Protocol Informatics project to make it work with a numpy.☆19May 4, 2012Updated 13 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Aug 9, 2018Updated 7 years ago
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning☆13Mar 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Experience Apache Iceberg with Dremio☆10Jan 10, 2022Updated 4 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Sep 4, 2016Updated 9 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- The Racoon2 project is a joint effort which provides an implementation of key management system for IPsec. The implementation is called R…☆27Sep 8, 2020Updated 5 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- Android gradle plugin to generate bytecode for accessing any method or field☆10May 16, 2019Updated 6 years ago
- UNMAINTAINED: I am now developing and using https://github.com/GhidraJupyter/ghidra-jupyter-kotlin instead, PRs still welcome☆16May 6, 2020Updated 5 years ago
- Exploit for LG Q710ULM (Stylo 4 AMZ variant) for writing arbitrary contents to eMMC and patching aboot via S-EL3 warmboot takeover☆14Jan 4, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- framework for fuzzing various open source tools☆18Jul 24, 2015Updated 10 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Jun 18, 2024Updated last year
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Open Source IOT device software for electric scooters.☆10Jan 5, 2023Updated 3 years ago
- ☆12Jul 5, 2024Updated last year
- Converts a Kaitai Struct file description to a Wireshark LUA plugin☆42Apr 7, 2022Updated 3 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Ghidra plugin for querying the Symgrate databases.☆15Apr 30, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- work with Linux on RK3066☆13Jun 23, 2014Updated 11 years ago
- FPGArduino binary☆13Aug 5, 2019Updated 6 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Feb 26, 2020Updated 6 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 5 years ago
- collect☆18Mar 29, 2020Updated 5 years ago