Large-scale Analysis of Cryptographic Misuse in IoT Devices
☆23Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for CRYPTOREX
Users that are interested in CRYPTOREX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12May 6, 2020Updated 5 years ago
- ☆12May 9, 2022Updated 3 years ago
- ☆121Dec 27, 2022Updated 3 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆39Nov 27, 2024Updated last year
- Automated Binary Analysis on iOS☆111Jul 2, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- An Empirical Study of AI Techniques in Mobile Applications☆12May 28, 2024Updated last year
- Collection of CTF challenges I made☆18Apr 2, 2018Updated 7 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- ☆31May 28, 2023Updated 2 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- ☆24Dec 3, 2020Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated 2 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Apr 12, 2020Updated 5 years ago
- ☆15May 26, 2021Updated 4 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- Code snippets for Binary Ninja's Python API☆35Jun 2, 2021Updated 4 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Aug 16, 2021Updated 4 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- ☆26Mar 17, 2021Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated 2 months ago
- ☆53Nov 1, 2020Updated 5 years ago