Highlights
- Pro
Lists (19)
Sort Name ascending (A-Z)
Stars
Intermediate Representation for Binary analysis and transformation
A True Instrumentable Binary Emulation Framework
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
A repository for learning various heap exploitation techniques.
cwe_checker finds vulnerable patterns in binary executables
High-Efficiency eXpanded Coverage for Improved Testing of Executables
Ghidra is a software reverse engineering (SRE) framework
SAFE: Self-Attentive Function Embeddings for binary similarity
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
Run fuzzing experiments in Docker
A tool to predict vulnerability discovery of binary only programs
VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary
Repetition for <Scalable Graph-based Bug Search for Firmware Images>
FuzzBench - Fuzzer benchmarking as a service.
OSS-Fuzz - continuous fuzzing for open source software.
Artifact for ISSTA'23 paper "Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection (Experience Paper)"
Implementation of SMO-SVM based on Python code
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
Automatically update your Windows hosts file with the WSL2 VM IP address