-
BugProve
- Brussels
- www.bugprove.com
Stars
A free-range, non-GMO fork of busybox in 100% Rust 🦀
Linux anti-debugging and anti-analysis rust library
Memfault SDK for embedded Linux systems. Observability, logging, crash reporting, and updating all in one service. More information at https://docs.memfault.com.
Use angr inside GDB. Create an angr state from the current debugger state.
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
A taint-tracking plugin for the Valgrind memory checking tool
A library for building abstract interpretation-based analyses. **Update**: crab is still actively maintained. Please use branch dev.
A C compiler targeting an artistically pleasing nightmare for reverse engineers
Extract files from any kind of container formats
A collection of my Semgrep rules to facilitate vulnerability research.
CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security
Identify and test the security of dynamic memory allocators in monolithic firmware images
Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
cwe_checker finds vulnerable patterns in binary executables
SymQEMU: Compilation-based symbolic execution for binaries
SymCC: efficient compiler-based symbolic execution
Fuzzware's main repository. Start here to install.
Modular binary injection framework, successor of libhooker
A remote interface for live access to OMNeT++ simulations
Android Auto Server encapsulates communication with modern car infotainment system
A clean implementation based on AlphaZero for any game in any framework + tutorial + Othello/Gobang/TicTacToe/Connect4 and more
Integrates the Stockfish chess engine with Python
ModSecurity CRS rules parser (project moved to CRS-support: see https://github.com/CRS-support/secrules_parsing)
Ghidra is a software reverse engineering (SRE) framework