Showing 2 open source projects for "hermes/2018"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 1
    EasyProtector

    EasyProtector

    Simple way to check root/virtual app/emulator/xposed framework

    ...Since it's all here, you are welcome to star/fork, even if you raise an issue, I hope this is a useful library (eliminate the initialization operation of the application, avoid more permission requirements, and load as lazy as possible) Mainly to fix a bunch of bugs, see the pictures in the image folder for the adaptation situation, Tencent Legu's old version of XposedCheck code has some code in copy SecurityCheckUtil, the new version can't see it anymore. After all, the simulator is a company-level product with limited personal capabilities. I hope everyone can mention more pr. Since 2018/6/13 integrated and launched your own project, the detection data of 11w+ suspected simulators have been collected by 10/24. If you need to do very detailed simulator identification in your business, you can add judgment conditions by yourself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Miasm

    Miasm

    Reverse engineering framework in Python

    The Miasm intermediate representation is used for multiple task: emulation through its jitter engine, symbolic execution, DSE, program analysis, but the intermediate representation can be a bit hard to read. We will present in this article new tricks Miasm has learned in 2018. Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout does not always totally conform with a reverse engineering “ideal view”, so please be tolerant of those odd graphs. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB