The prototype implementation of our USENIX 2023 paper
☆15Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for Minimalist
Users that are interested in Minimalist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- It is a RESTful API fuzzer.☆12Jun 20, 2024Updated last year
- ☆11Mar 5, 2023Updated 3 years ago
- IDLReasoner: A MiniZinc-based Java library for analyzing IDL specifications☆11Jan 4, 2022Updated 4 years ago
- 云原生安全☆38Feb 20, 2022Updated 4 years ago
- Ultimate Benchmark for Container Image Scanners☆13Oct 16, 2020Updated 5 years ago
- An investigative study on the security and privacy aspects of Progressive Web Apps☆19Oct 14, 2018Updated 7 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- Implementation of "Group-Wise Deep Object Co-Segmentation With Co-Attention Recurrent Neural Network" ICCV 2019☆14Jan 27, 2023Updated 3 years ago
- iot-vuls☆24Mar 19, 2024Updated 2 years ago
- ☆11May 14, 2022Updated 3 years ago
- ☆43Jan 30, 2023Updated 3 years ago
- ☆25Apr 14, 2025Updated 11 months ago
- REAPER: Real-time App Analysis for Augmenting the Android Permission System☆16Feb 6, 2025Updated last year
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆14Jul 1, 2022Updated 3 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Combinatorial Testing of RESTful APIs☆21Feb 26, 2025Updated last year
- A grey-box web application Fuzzer☆25Aug 16, 2024Updated last year
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Fair Android Explorer☆22Apr 19, 2023Updated 2 years ago
- Hsuan-Fuzz: REST API Fuzzing by Coverage Level Guided Blackbox Testing☆29May 14, 2022Updated 3 years ago
- PWNable pyjail☆13Jan 13, 2025Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 7 months ago
- ☆16Feb 27, 2026Updated 3 weeks ago
- APK Crawler for Github, Xiaomi, FossDroid, ApkPure.☆22Jun 17, 2021Updated 4 years ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Sep 16, 2018Updated 7 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Mar 28, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- [AAAI20] Deep Object Co-segmentation via Spatial-Semantic Network Modulation(Oral paper)☆25Jun 4, 2021Updated 4 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- Quickly create your SQL test data☆16Mar 5, 2026Updated 2 weeks ago
- TIRO - A hybrid iterative deobfuscation framework for Android applications☆27Aug 17, 2018Updated 7 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- ☆38Oct 4, 2024Updated last year
- ☆27Feb 19, 2024Updated 2 years ago