Konano / ReqsMinerView external linksLinks
[NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding requests. The framework uses techniques derived from reinforcement learning to generate valid test cases, even with minimal feedback, and incorporates real field values into the grammar-based fuzzer.
☆25Jun 27, 2024Updated last year
Alternatives and similar repositories for ReqsMiner
Users that are interested in ReqsMiner are comparing it to the libraries listed below
Sorting:
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆21Apr 11, 2024Updated last year
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Dec 31, 2022Updated 3 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆16Dec 19, 2025Updated last month
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 5 months ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- 一个搜索网络安全领域顶会论文的小工具☆95Jul 29, 2025Updated 6 months ago
- ☆161Jun 3, 2024Updated last year
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- eTainter is an automated static taint analysis tool for detecting gas-related vulnerabilities in smart contracts.☆19Jul 24, 2023Updated 2 years ago
- ☆19Jul 21, 2020Updated 5 years ago
- ☆19Jun 27, 2023Updated 2 years ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- To store some files that I prepared for recommended postgraduate.☆17Jul 25, 2019Updated 6 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆261Oct 30, 2024Updated last year
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- A collection of security papers on top-tier publications☆61Jan 28, 2026Updated 2 weeks ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆24May 1, 2022Updated 3 years ago
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- ☆27Feb 19, 2024Updated last year
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- ☆32May 27, 2024Updated last year
- ☆27May 27, 2023Updated 2 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 8 months ago
- 通过 ebpf(bcc) 在 TCP 包中插入 TOA,实现任意 TOA 伪造☆28Dec 12, 2023Updated 2 years ago
- ☆30Nov 1, 2022Updated 3 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- ☆58Nov 23, 2025Updated 2 months ago
- HTTP3-attacks (CVE-2022-30592)☆79Dec 18, 2022Updated 3 years ago
- This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection met…☆11Jul 22, 2019Updated 6 years ago
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated last month