SWAT-project / SWATLinks
SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.
☆38Updated 9 months ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- A symbolic Java virtual machine for program analysis, verification and test generation☆119Updated 3 months ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Updated 2 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆75Updated last year
- COVA - A static analysis tool to compute path conditions☆40Updated 6 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Updated last year
- A Static Code Feature Extraction Tool for Java and Android☆21Updated 2 years ago
- Industrial IR-based static analysis framework for Java bytecode☆177Updated 7 months ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆20Updated 5 months ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆146Updated 2 weeks ago
- ☆28Updated 3 months ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆91Updated last year
- CodeHawk Abstract Interpretation Engine and Analyzers☆73Updated last week
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆90Updated 7 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Updated 4 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆67Updated 4 years ago
- ☆27Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆42Updated 2 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆37Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Updated last year
- ☆74Updated 2 weeks ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆22Updated 2 years ago
- ☆41Updated last year
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18Updated last year
- Fuzzing framework to target native components of android applications☆22Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆68Updated last year
- Mutation-guided mutation-based fuzz testing☆51Updated last year
- ☆78Updated 3 years ago
- CogniCrypt_SAST: CrySL-to-Static Analysis Compiler☆77Updated last week