Lists (13)
Sort Name ascending (A-Z)
Stars
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
StateAFL: A Greybox Fuzzer for Stateful Network Servers
Netzob: Protocol Reverse Engineering, Modeling and Fuzzing
List of (automatic) protocol reverse engineering tools for network protocols
andronat / SaBRe
Forked from srg-imperial/SaBReLoad-time selective binary rewriting
JQF + Zest: Coverage-guided semantic fuzzing for Java.
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
The repository provides code for running inference with the SegmentAnything Model (SAM), links for downloading the trained model checkpoints, and example notebooks that show how to use the model.
mboehme / aflfast
Forked from mirrorer/aflAFLFast (extends AFL with Power Schedules)
AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)
ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing
Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing tools, and resources that can help us use fuzzer easily.
Large Language Model guided Protocol Fuzzing (NDSS'24)
Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践
Code for the paper Poisoning Network Flow Classifiers
Python实现 页面置换算法(OPT,FIFO,LRU)、最坏适应、时间片轮转
Code for our paper in submission "Towards Assessing the Synthetic-to-Measured Adversarial Vulnerability of SAR ATR".
[IEEE TGRS 2022] Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark