Tools used for MineSweeper project
☆31May 5, 2021Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- Collects all WebAssembly modules from a given website☆27Aug 13, 2020Updated 5 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- This is the home of the CoinBlockerLists homepage.☆17Jul 18, 2018Updated 7 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- ☆14Nov 9, 2024Updated last year
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Browser automation for Chameleon.☆20Sep 27, 2016Updated 9 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- ☆33Dec 26, 2025Updated 2 months ago
- AMD SEV-SNP rust utils☆16May 13, 2025Updated 10 months ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- ☆12Sep 21, 2022Updated 3 years ago
- Navigation-based Tracking Mitigations☆52Mar 25, 2025Updated 11 months ago
- BREWasm: A general purpose static binary rewriting framework for Wasm.☆23Nov 28, 2024Updated last year
- ☆15Nov 29, 2020Updated 5 years ago
- ☆10Nov 15, 2021Updated 4 years ago
- AutoFR generates filter rules for the web to block ads while considering visual breakage automatically.☆11Mar 12, 2024Updated 2 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- ☆24Mar 30, 2022Updated 3 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆42Jan 13, 2026Updated 2 months ago
- ☆17Jun 7, 2022Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Ghidra Analysis Enhancer 🐉 Python3 version.☆13Aug 25, 2023Updated 2 years ago
- A brand new OS that runs in various kinds of TEEs and supports Linux ABI☆16Aug 21, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- ☆16May 20, 2019Updated 6 years ago
- ICSE 2021 Artifact for: Shipwright: A Human-in-the-Loop System for Dockerfile Repair.☆23May 11, 2021Updated 4 years ago
- Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.☆58Jan 26, 2024Updated 2 years ago
- ☆19Apr 14, 2024Updated last year