vlad902 / joern-traversalsView external linksLinks
Example queries for joern
☆18Feb 2, 2017Updated 9 years ago
Alternatives and similar repositories for joern-traversals
Users that are interested in joern-traversals are comparing it to the libraries listed below
Sorting:
- ☆26Oct 13, 2015Updated 10 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Python utilities for joern☆36Nov 13, 2018Updated 7 years ago
- NCC Code Navigator☆55May 9, 2016Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Binary analysis platform based on Octopus and Radare2☆78Nov 7, 2016Updated 9 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Grail+ is a set of command line tools for manipulating non-deterministic finite automata (NFAs), non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 3 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆36Jan 27, 2026Updated 2 weeks ago
- ☆12Feb 23, 2015Updated 10 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 7 months ago
- ☆25Sep 17, 2025Updated 4 months ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- "you are your dotfiles"☆11Oct 10, 2025Updated 4 months ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Taiga.Io as a Docker Image. Ready to docker-compose up.☆13Sep 29, 2019Updated 6 years ago
- Writing Radare2 plugins in various languages☆17Sep 22, 2025Updated 4 months ago
- A robust parser for C/C++ storing abstract syntax trees, control flow graphs and program dependence graphs in a neo4j graph database.☆555May 10, 2019Updated 6 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- ☆159Feb 23, 2015Updated 10 years ago
- ☆40Apr 21, 2015Updated 10 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- ☆10Feb 9, 2019Updated 7 years ago
- A simple operating system (SOS) built on top of the seL4 microkernel☆12Mar 3, 2018Updated 7 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago