Fraunhofer-AISEC / cpg-neo4jView external linksLinks
Neo4J visualisation tool for the Code Property Graph
☆14May 17, 2021Updated 4 years ago
Alternatives and similar repositories for cpg-neo4j
Users that are interested in cpg-neo4j are comparing it to the libraries listed below
Sorting:
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆410Updated this week
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆91Jan 22, 2025Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆28Jan 22, 2025Updated last year
- Automatically scan jar packages by using ast to find fastjson gadgets. In particular, this project is limited to mining Gadgets that may …☆49Mar 8, 2022Updated 3 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- ☆32Jun 10, 2020Updated 5 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆77Oct 14, 2024Updated last year
- TongASDP漏洞测试环境☆35Mar 22, 2023Updated 2 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- Code and dataset for paper C4: Contrastive Cross-Language Code Clone Detection☆32May 24, 2022Updated 3 years ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- ☆12Feb 24, 2025Updated 11 months ago
- A list of all projects by UW CSE students.☆10Feb 8, 2016Updated 10 years ago
- COVA - A static analysis tool to compute path conditions☆40Jul 12, 2025Updated 7 months ago
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆19Feb 8, 2026Updated last week
- ☆13Feb 26, 2021Updated 4 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- PHP Static Program Analysis☆42Mar 29, 2023Updated 2 years ago
- Taint analysis implementation based on Heros and Soot☆45May 6, 2024Updated last year
- Web Cache Poisoning Vulnerability Scanner☆43Dec 29, 2025Updated last month
- ☆35Dec 22, 2018Updated 7 years ago
- ☆42Apr 15, 2023Updated 2 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 4 years ago
- State Key Laboratory for Novel Software Technology, Nanjing University, China☆10Nov 22, 2025Updated 2 months ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 7 months ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- A practical fuzzing tool for SMT solvers☆11Nov 26, 2025Updated 2 months ago
- ☆18Nov 7, 2024Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- ☆12Jan 28, 2023Updated 3 years ago