a project repository for a paper
☆20May 4, 2024Updated last year
Alternatives and similar repositories for JavaScript-vulnerability-detection
Users that are interested in JavaScript-vulnerability-detection are comparing it to the libraries listed below
Sorting:
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆24Dec 10, 2025Updated 3 months ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Jan 18, 2023Updated 3 years ago
- ☆38Oct 4, 2024Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated last year
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆26Nov 30, 2021Updated 4 years ago
- A keyword based crawler for WeChat Mini-apps☆51Jun 29, 2021Updated 4 years ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- ☆13Jun 15, 2024Updated last year
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆26Updated this week
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆37Jul 14, 2025Updated 8 months ago
- Just a small demo of CVSS V3.0 Scoring in an excel spreadsheet☆12Apr 1, 2018Updated 7 years ago
- A learning-guided approach for executing arbitrary Python code snippets☆16Mar 4, 2024Updated 2 years ago
- ☆13Feb 11, 2022Updated 4 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆81Feb 28, 2026Updated 2 weeks ago
- ☆15Aug 17, 2017Updated 8 years ago
- ☆24Mar 13, 2015Updated 11 years ago
- A Node.js vulnerability finding tool.☆96Aug 7, 2025Updated 7 months ago
- ☆19Feb 13, 2017Updated 9 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- my personal blog☆11Aug 26, 2015Updated 10 years ago
- Fast Expert Witness Compression Format (EWF) hash calculator☆15Sep 15, 2021Updated 4 years ago
- An implementation of the HTML5 fetch() API which leverages GM_xmlhttpRequest☆20Jun 17, 2015Updated 10 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Piping with js at terminal☆14Nov 7, 2024Updated last year
- Easily start and access servers☆47Jun 20, 2017Updated 8 years ago
- A flexible & extensible mongodb transaction library for nodejs.☆11Apr 20, 2017Updated 8 years ago
- ☆19Oct 5, 2018Updated 7 years ago
- This is the repository for the paper "Cross Miniapp Request Forgery"☆20Aug 30, 2023Updated 2 years ago