NSSL-SJTU / VoAPI2
☆20Updated 7 months ago
Alternatives and similar repositories for VoAPI2:
Users that are interested in VoAPI2 are comparing it to the libraries listed below
- ☆36Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- ☆46Updated last year
- ☆24Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆163Updated 5 months ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆21Updated 3 weeks ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 3 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 5 months ago
- FirmSec Dataset☆33Updated 2 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆63Updated 6 months ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆28Updated last year
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆47Updated last year
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆46Updated last month
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆107Updated 4 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆10Updated last year
- Automatically exported from code.google.com/p/alpha3☆54Updated 4 years ago
- Archive of AAA CTF 2022 (XCTF competition)☆77Updated 3 months ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 3 months ago
- ☆79Updated 10 months ago
- Official source code and writeups of *CTF2021☆82Updated 4 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆298Updated 2 months ago
- A collection of security papers on top-tier publications☆40Updated 2 weeks ago
- ☆26Updated 5 months ago
- ☆14Updated 7 months ago
- Some test samples for CPG execution logic.☆21Updated 10 months ago
- ☆21Updated 2 years ago
- ☆61Updated last year
- ☆14Updated 2 years ago