[NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding requests. The framework uses techniques derived from reinforcement learning to generate valid test cases, even with minimal feedback, and incorporates real field values into the grammar-based fuzzer.
☆25Jun 27, 2024Updated last year
Alternatives and similar repositories for ReqsMiner
Users that are interested in ReqsMiner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Jun 7, 2022Updated 3 years ago
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- Attacks against QUIC (CVE-2022-30591)☆27Dec 31, 2022Updated 3 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Mar 20, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Grammar-based HTTP/2 fuzzer with mutation ability☆47Aug 18, 2022Updated 3 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- ☆40Aug 22, 2023Updated 2 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆18Dec 19, 2025Updated 4 months ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concept☆14Nov 10, 2023Updated 2 years ago
- 一个搜索网络安全领域顶会论文的小工具☆95Jul 29, 2025Updated 9 months ago
- 通过 ebpf(bcc) 在 TCP 包中插入 TOA,实现任意 TOA 伪造☆28Dec 12, 2023Updated 2 years ago
- HTTP3-attacks (CVE-2022-30592)☆80Dec 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆21Jun 27, 2023Updated 2 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated 2 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆17Jan 17, 2025Updated last year
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated 2 years ago
- Data Poisoning in Deep Learning: A Survey☆22Jan 18, 2026Updated 3 months ago
- ☆10Mar 5, 2023Updated 3 years ago
- ☆31Nov 1, 2022Updated 3 years ago
- ☆19Jul 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- eTainter is an automated static taint analysis tool for detecting gas-related vulnerabilities in smart contracts.☆21Jul 24, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆19Aug 9, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- Slime是一个组合众多优秀安全工具的漏扫软件,它将目光集中在安全工具的组合上,而不是自己实现漏扫的某一流程。☆17Sep 9, 2022Updated 3 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated last month
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- To store some files that I prepared for recommended postgraduate.☆17Jul 25, 2019Updated 6 years ago
- This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection met…☆11Jul 22, 2019Updated 6 years ago
- Artifact for ICSE 2023☆52Sep 24, 2022Updated 3 years ago
- pgp.ustc.edu.cn deployment☆10Mar 25, 2019Updated 7 years ago