Leo0426 / WALA-improve
Study WALA and static code analysis . This project introduces the required knowledge and study roadmap.
☆22Updated 4 years ago
Alternatives and similar repositories for WALA-improve:
Users that are interested in WALA-improve are comparing it to the libraries listed below
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 6 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 2 months ago
- Taint analysis implementation based on Heros and Soot☆44Updated 11 months ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆17Updated 6 years ago
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- afl源码分析☆13Updated 6 years ago
- A benchmark to evaluate taint analysis☆30Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆74Updated last year
- Personal CodeQL queries☆62Updated last week
- Precision-guided context sensitivity for pointer analysis☆60Updated last year
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆35Updated 5 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 5 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 4 months ago
- 模糊测试种子库 comprehensive croups for fuzzing seeds with carfefully selected(rate=coverage/filesize)☆23Updated 4 years ago
- oh my soot !☆90Updated 2 years ago
- JAVA指针分析☆13Updated 5 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆57Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆23Updated 3 years ago
- r3kapig website☆32Updated last week
- IoT Security Papers☆48Updated 5 years ago
- Some test samples for CPG execution logic.☆21Updated last year
- ☆35Updated 6 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆73Updated 6 months ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 6 years ago
- easy_Pwn☆18Updated 6 years ago
- ☆11Updated 6 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Updated 6 years ago
- ☆11Updated last year