☆61Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for BlackWidow
Users that are interested in BlackWidow are comparing it to the libraries listed below
Sorting:
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆31Jan 22, 2018Updated 8 years ago
- ☆20Jan 19, 2026Updated 2 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- ☆11Sep 6, 2024Updated last year
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 3 months ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- Leveraging LLM to generate Java deserialization chains☆52Mar 12, 2026Updated last week
- ☆43Jan 30, 2023Updated 3 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- YuraScanner☆73Feb 13, 2025Updated last year
- Web Input Vector Extractor Teaser☆132Jan 6, 2022Updated 4 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- ☆17Apr 7, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- ☆242Jan 27, 2019Updated 7 years ago
- ☆206Oct 27, 2025Updated 4 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 7 months ago
- ☆18Nov 6, 2024Updated last year
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 5 months ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- ☆14Feb 4, 2020Updated 6 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆15Feb 15, 2023Updated 3 years ago
- ☆41May 7, 2024Updated last year
- Struct-aware fuzzing framework + some fuzzers☆30Jan 28, 2026Updated last month
- ☆23Jul 3, 2022Updated 3 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- Home page for this github organization☆22Aug 10, 2018Updated 7 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- The next-generation AI Agent framework driven by Intent Engineering. Move beyond turn-based Function Calling to embrace code-level intent…☆75Jan 11, 2026Updated 2 months ago