SWAT-project / SWATLinks
SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.
☆32Updated last month
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Updated last year
- A symbolic Java virtual machine for program analysis, verification and test generation☆111Updated last week
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆74Updated 7 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 4 months ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆135Updated last month
- A dynamic symbolic analysis tool for Java☆119Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 7 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 5 months ago
- COVA - A static analysis tool to compute path conditions☆36Updated 2 years ago
- The official repo of Doop, the declarative pointer analysis framework.☆180Updated 2 months ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆87Updated 4 months ago
- A points-to and alias analysis benchmark suite☆41Updated 6 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆18Updated 2 years ago
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- Static checker for Java☆86Updated 4 months ago
- ☆22Updated 2 years ago
- Phosphor: Dynamic Taint Tracking for the JVM☆175Updated 5 months ago
- A program slicer for Java, based on the system dependence graph (SDG).☆66Updated last year
- CodeHawk Abstract Interpretation Engine and Analyzers☆68Updated last week
- A Static Code Feature Extraction Tool for Java and Android☆20Updated last year
- ☆11Updated 6 years ago
- Mutation-guided mutation-based fuzz testing☆45Updated 10 months ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆40Updated 3 years ago
- TamiFlex facilitates static analysis of programs that use reflection and custom class loaders☆43Updated 4 years ago
- Precision-guided context sensitivity for pointer analysis☆60Updated last year
- Basic Gradle configuration and example drivers to get started with WALA☆29Updated 6 months ago
- ☆21Updated last week
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆68Updated 9 months ago
- CogniCrypt_SAST: CrySL-to-Static Analysis Compiler☆74Updated this week