JavaScript Transformation Techniques Detection
☆11Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for js-transformations
Users that are interested in js-transformations are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆75Jan 18, 2021Updated 5 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Feb 26, 2022Updated 4 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆26Nov 30, 2021Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Feb 1, 2020Updated 6 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆14Sep 18, 2023Updated 2 years ago
- ☆10Sep 25, 2024Updated last year
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- Framework which makes large scale crawling of URLs with VisibleV8 easy.☆11Jan 28, 2026Updated last month
- Security technique research and some funny work on it !☆12Dec 18, 2018Updated 7 years ago
- Discovered Data and Source Code☆10May 5, 2025Updated 9 months ago
- UpCy automatically finds compatible updates for Maven dependencies.☆12Feb 8, 2026Updated 3 weeks ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 3 weeks ago
- ☆15Mar 19, 2022Updated 3 years ago
- A crawler that uses OpenWPM.☆12Dec 26, 2021Updated 4 years ago
- Ensemble learning with graph neural networks for disease module discovery and classification☆11Nov 5, 2023Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- JEST: N+1-version Differential Testing of Both JavaScript Engines☆14Jun 1, 2021Updated 4 years ago
- A simple web app for decrypting and encrypting Akamai v3 sensor data.☆20Apr 28, 2025Updated 10 months ago
- 💡 Info about the nice-registry project☆12Aug 23, 2017Updated 8 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆22Dec 10, 2025Updated 2 months ago
- ☆14Feb 11, 2023Updated 3 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Akamai CLI for EdgeWorkers, allows you to interact with EdgeWorkers APIs via a command line interface☆20Feb 23, 2026Updated last week
- Demo app searches and shows photos from Flickr☆13Mar 10, 2015Updated 10 years ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- ☆15Aug 17, 2017Updated 8 years ago
- A collection of handy ML and data visualization and validation tools. Go ahead and train, evaluate and validate your ML models and data w…☆22Aug 12, 2025Updated 6 months ago
- ☆16Apr 18, 2021Updated 4 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Oct 20, 2020Updated 5 years ago
- Librarian: An Empirical Study of Security Updates in Android Apps’ Native Code☆22Jan 22, 2021Updated 5 years ago
- A Pytorch implementation of "Data-Free Learning of Student Networks" (ICCV 2019).☆18Oct 8, 2019Updated 6 years ago
- a project repository for a paper☆20May 4, 2024Updated last year
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago