Tuesday, July 27, 2021
Home Tags Concolic Analysis

Tag: Concolic Analysis

Must Need

Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)

Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular...

Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the...
Quarantyne · Modern Web Firewall

Quarantyne · Modern Web Firewall

Quarantyne is a reverse-proxy that protects web applications and APIs from fraudulent behavior, misuse, bots and cyber-attacks in real-time.
Sinter : User-Mode Application Authorization System For MacOS

Sinter : User-Mode Application Authorization System For MacOS

Sinter is a 100% user-mode endpoint security agent for macOS 10.15 and above, written in Swift. It uses the user-mode EndpointSecurity API...
XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XposedOrNot or XoN tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage...
Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages...
HyperDbg : The Source Code Of HyperDbg Debugger

HyperDbg : The Source Code Of HyperDbg Debugger

HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates...
Cybersecurity : Tips for the Best Measures to Protect Your Data

Cybersecurity : Tips for the Best Measures to Protect Your Data

Cybersecurity is becoming a challenge to most individuals in society nowadays. People are losing money, among other essentials, through online fraud. Now,...