Skip to content
View 00xc's full-sized avatar

Organizations

@scavengersecurity @coconut-svsm

Block or report 00xc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
7 stars written in C++
Clear filter

nghttp2 - HTTP/2 C Library and tools

C++ 4,966 931 Updated Mar 23, 2026

Tutorials, examples, discussions, research proposals, and other resources related to fuzzing

C++ 3,757 446 Updated Oct 24, 2024

wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…

C++ 1,739 148 Updated Jan 2, 2026

Open-source symbolic execution framework: https://maat.re

C++ 648 44 Updated Feb 22, 2026

American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries

C++ 189 49 Updated May 21, 2021

Backtrace support for Rust `no_std` and embedded programs.

C++ 48 7 Updated May 7, 2023

The Fast Lines of Code Counter

C++ 11 Updated Aug 22, 2025