SWAT-project / SWATLinks
SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.
☆33Updated 3 months ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- A symbolic Java virtual machine for program analysis, verification and test generation☆113Updated this week
- Industrial IR-based static analysis framework for Java bytecode☆167Updated last month
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆74Updated 9 months ago
- ☆21Updated this week
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Updated 6 months ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆88Updated 6 months ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆135Updated this week
- Phosphor: Dynamic Taint Tracking for the JVM☆177Updated last month
- A Static Code Feature Extraction Tool for Java and Android☆20Updated 2 years ago
- The official repo of Doop, the declarative pointer analysis framework.☆180Updated 2 months ago
- ☆63Updated last week
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆17Updated 10 months ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 7 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆76Updated last year
- IFDS/IDE Solver for Soot and other frameworks☆249Updated 2 years ago
- Heaps Don't Lie! Analyzes standard JVM and Android heap snapshots to improve the completeness of program analysis tools such as Doop.☆14Updated last year
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 7 years ago
- COVA - A static analysis tool to compute path conditions☆36Updated 3 weeks ago
- A dynamic symbolic analysis tool for Java☆120Updated 6 years ago
- A program slicer for Java, based on the system dependence graph (SDG).☆67Updated 3 weeks ago
- ShiftLeft OverflowDB☆127Updated 2 months ago
- CodeHawk Abstract Interpretation Engine and Analyzers☆69Updated 2 weeks ago
- A set of Code-ql/Joern queries to find vulnerabilities☆63Updated 4 years ago
- Analyse package dependency networks at the call graph level☆95Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆71Updated 11 months ago
- A new version of Soot with a completely overhauled architecture☆713Updated this week
- A neurosymbolic framework for vulnerability detection in code☆188Updated this week
- Static checker for Java☆86Updated 6 months ago