Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale
☆80Nov 23, 2021Updated 4 years ago
Alternatives and similar repositories for DoubleX
Users that are interested in DoubleX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- ☆14Feb 11, 2023Updated 3 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Feb 26, 2022Updated 4 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 3 weeks ago
- Modular static malicious JavaScript detection system☆75Jan 18, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Discovered Data and Source Code☆10May 5, 2025Updated 10 months ago
- Gather pagegraph data from all over the internet☆28Updated this week
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆119Feb 13, 2026Updated last month
- ☆15Sep 14, 2022Updated 3 years ago
- Puppeteer based crawler to measure email and password exfiltration☆27Jan 7, 2026Updated 2 months ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- List of known problematic browser extensions☆37Aug 6, 2023Updated 2 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- Toolchain to retrieve and parse privacy policies from websites as described in our paper "Unifying Privacy Policy Detection" by Henry Hos…☆17Apr 8, 2025Updated 11 months ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Jan 18, 2023Updated 3 years ago
- Performant taint analysis for Node.js☆58Aug 7, 2024Updated last year
- Collection of manifest files for 100k Chrome extensions☆88Jan 17, 2025Updated last year
- Game jam project made during Ludum Dare 53☆11May 21, 2023Updated 2 years ago
- Static Jimple Slicer for Android Apps☆13Dec 2, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 3 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- A Generic and Efficient Code Property Graph Infrastructure forScanning Vulnerabilities in WebAssembly Code☆31Aug 16, 2024Updated last year
- A mobile web privacy measurement framework based on OpenWPM☆17Apr 11, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- ☆18Jan 20, 2026Updated 2 months ago
- 🔥🔥🔥🚀Windows平台版本的apk、ipa、so、aar、jar等库代码扫描工具☆18Aug 14, 2023Updated 2 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated 2 months ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆27Oct 15, 2022Updated 3 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Lightweight Chromium Sandbox☆24Sep 26, 2025Updated 6 months ago
- JavaScript virtual machine for WebAssembly and Taint Tracking security tool☆15Dec 15, 2017Updated 8 years ago
- Binary Code Summarization☆14Apr 3, 2025Updated 11 months ago