☆61Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for BlackWidow
Users that are interested in BlackWidow are comparing it to the libraries listed below
Sorting:
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆31Jan 22, 2018Updated 8 years ago
- ☆20Jan 19, 2026Updated last month
- ☆27Feb 19, 2024Updated 2 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- ☆16Apr 7, 2023Updated 2 years ago
- ☆42Jan 30, 2023Updated 3 years ago
- ☆11Sep 6, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆76Aug 15, 2024Updated last year
- YuraScanner☆73Feb 13, 2025Updated last year
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 2 months ago
- ☆206Oct 27, 2025Updated 4 months ago
- Witcher is the first framework for using AFL to fuzz web applications.☆103Nov 28, 2023Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- ☆14Feb 4, 2020Updated 6 years ago
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 4 months ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆22Jul 3, 2022Updated 3 years ago
- de1ctf 2020 mc challs - mc系列题目☆18May 6, 2020Updated 5 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 6 months ago
- ☆35Feb 4, 2026Updated 3 weeks ago
- Home page for this github organization☆22Aug 10, 2018Updated 7 years ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆141Apr 7, 2025Updated 10 months ago
- Search-based Test Data Generation for Relational Database Schemas☆24Mar 24, 2021Updated 4 years ago
- 《漏洞全解》该项目不提供任何的POC与EXP,仅仅分享各种机缘巧合下所产生的漏洞的分析。☆26Aug 30, 2023Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated last year
- ☆242Jan 27, 2019Updated 7 years ago
- ☆32Jul 22, 2023Updated 2 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆36Oct 9, 2022Updated 3 years ago