Large-scale Analysis of Cryptographic Misuse in IoT Devices
☆23Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for CRYPTOREX
Users that are interested in CRYPTOREX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12May 6, 2020Updated 5 years ago
- ☆12May 9, 2022Updated 3 years ago
- ☆121Dec 27, 2022Updated 3 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆38Nov 27, 2024Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- Generate lua call graph☆15Apr 23, 2023Updated 2 years ago
- Collection of CTF challenges I made☆18Apr 2, 2018Updated 8 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- angr中文版文档☆35Oct 27, 2018Updated 7 years ago
- ☆31May 28, 2023Updated 2 years ago
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 10 months ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆45Mar 13, 2022Updated 4 years ago
- ☆24Dec 3, 2020Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆63Aug 8, 2024Updated last year
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated 2 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Apr 12, 2020Updated 6 years ago
- ☆15May 26, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- Code snippets for Binary Ninja's Python API☆35Jun 2, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A filter cascade implementation in rust☆15Apr 5, 2023Updated 3 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 9 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated 2 months ago
- ☆52Nov 1, 2020Updated 5 years ago