Skip to content
View yixiaoxian's full-sized avatar

Block or report yixiaoxian

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

The pattern matching swiss knife

C 8,531 1,469 Updated Feb 11, 2025

AGE animation official website URL release page(AGE动漫官网网址发布页)

6,696 169 Updated Apr 21, 2024

Some examples of uses for Xray-core.

Shell 2,416 793 Updated Feb 7, 2025

OS kernel labs based on Rust/C Lang & RISC-V 64/X86-32

Rust 3,994 1,910 Updated Jan 27, 2023

A curated collection of adversarial attack and defense on graph data.

Python 563 79 Updated Nov 7, 2023
Jupyter Notebook 271 33 Updated Jul 30, 2024

程序语言与编译技术相关资料(持续更新中)

2,059 265 Updated May 22, 2024

The Z3 Theorem Prover

C++ 10,651 1,496 Updated Feb 12, 2025

This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020

Python 60 6 Updated Aug 22, 2023

AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)

C 897 193 Updated Jul 25, 2024

Operational information regarding the log4shell vulnerabilities in the Log4j logging library.

Python 1,897 601 Updated Jun 15, 2022

东南大学《知识图谱》研究生课程

4,058 1,119 Updated Apr 29, 2024

Testing Intermediate Representations for Binary Analysis (ASE '17)

F# 80 11 Updated Dec 5, 2018
C 27 3 Updated Oct 25, 2021
C 71 15 Updated Aug 2, 2022

Here is the replication of the paper Probabilistic Delta Debugging, which has been accepted by ESEC/FSE 2021. More details can be found in README.

C 15 2 Updated Aug 2, 2021

The Use of Likely Invariants as Feedback for Fuzzers

C 88 10 Updated Jan 19, 2022

Standard collection of rules for capa: the tool for enumerating the capabilities of programs

566 167 Updated Feb 5, 2025

Some C++ example code to demonstrate how to perform code similarity searches using SimHashing.

C++ 560 95 Updated Jun 24, 2020

Discovering Malicious Functionality through Binary Reconstruction

Python 52 11 Updated Sep 2, 2021

A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net

ActionScript 893 190 Updated Mar 26, 2024

Easiest way to download samples through VirusTotal Intelligence

Python 37 17 Updated May 30, 2017
Python 635 74 Updated Feb 12, 2025

ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together

C++ 385 42 Updated Jan 15, 2023

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…

Python 4,040 561 Updated Jan 28, 2025

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…

Python 1,906 209 Updated Oct 27, 2024

Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains

Python 54 7 Updated Dec 7, 2021

A True Instrumentable Binary Emulation Framework

Python 5,241 736 Updated Jan 20, 2025

We hinder fuzzing

C 65 10 Updated Dec 27, 2021
Next