Trail of Bits
- New York, New York
- https://www.trailofbits.com
- opensource@trailofbits.com
Grow your team on GitHub
GitHub is home to over 50 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
Sign up
Pinned repositories
Repositories
-
siderophile
Find the ideal fuzz targets in a Rust codebase
-
osquery
Forked from osquery/osquerySQL powered operating system instrumentation, monitoring, and analytics.
-
ebpfpub
ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.
-
polytracker
An LLVM-based instrumentation tool for universal taint analysis.
-
-
-
manticore
Symbolic execution tool
-
-
-
deepstate
A unit test-like interface for fuzzing and symbolic execution
-
mishegos
A differential fuzzer for x86 decoders
-
anselm
Detect patterns of bad behavior in function calls
-
-
streamalert
Forked from airbnb/streamalertStreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
-
sandshrew
Underconstrained symbolic execution for cryptography verification
-
omaha-server
Forked from omaha-consulting/omaha-serverGoogle Omaha server (as known as Google Update)
-
-
-
-
polyfile
A utility for mapping the file formats embedded within a single file
-
-
graphtage
A semantic diff utility and library for tree-like files such as JSON, JSON5, XML, HTML, YAML, and CSV.
-
la-infosec
Mapping the LA Infosec Community
-
mimid
Forked from vrthra/mimidReplication package for Mining Input Grammars From Dynamic Control Flow
-
-
publications
Publications from Trail of Bits
-
not-slithering-anywhere
The Python Version of our Not Go-ing Anywhere Vulnerable Application
-
sinter
A user-mode application authorization system for MacOS written in Swift
-
go-mutexasserts
A small library that allows to check if Go mutexes are locked
-
winchecksec
Checksec, but for Windows: static detection of security mitigations in executables