☆10Aug 16, 2012Updated 13 years ago
Alternatives and similar repositories for Data-Flow-Analysis
Users that are interested in Data-Flow-Analysis are comparing it to the libraries listed below
Sorting:
- An automatic API misuse checker for C programs!☆19Apr 3, 2019Updated 6 years ago
- a CIL-based dynamic symbolic execution (DSE) engine for C language☆10Jan 23, 2015Updated 11 years ago
- Website for Research Artifacts from the Security Community☆31Feb 26, 2026Updated last week
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last month
- A tool that analyzes the byte-code of Java .class files and generates control-flow graphs in Graphviz (dot) format from it.☆27Jul 15, 2022Updated 3 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- An inter-procedural data-flow analysis framework using value-based context sensitivity☆93May 24, 2024Updated last year
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Repository for ASE 2017 paper, "Modular Verification of Interrupt-driven Software".☆11May 20, 2019Updated 6 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- A blog of Programming Languages Group @Purdue☆11Feb 17, 2026Updated 2 weeks ago
- A python code for HART-IP Specification☆12Aug 18, 2016Updated 9 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- Web app for drag drop building bootstrap forms.☆41Jun 24, 2018Updated 7 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- ☆11Jun 2, 2015Updated 10 years ago
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Ranking LLM-Generated Loop Invariants for Program Verification.☆12Aug 20, 2024Updated last year
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- Plugin files for editing K files☆12Aug 20, 2024Updated last year
- An implementation of sparse-value flow analysis on top of soot (using Scala)☆10Dec 12, 2024Updated last year
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- 一个简单的pdf在线压缩网站☆11Sep 16, 2021Updated 4 years ago
- 🍺 Protobuf language supporting for monaco editor☆10Mar 22, 2018Updated 7 years ago
- https://hackmd.io/s/r1SgsdF3X☆10Dec 21, 2018Updated 7 years ago
- ☆11Mar 19, 2022Updated 3 years ago