VainlyStrain / charonLinks
A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.
☆18Updated 3 months ago
Alternatives and similar repositories for charon
Users that are interested in charon are comparing it to the libraries listed below
Sorting:
- A set of Code-ql/Joern queries to find vulnerabilities☆66Updated 4 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆73Updated last year
- ☆16Updated 2 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- Artifact for ICSE 2023☆50Updated 3 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆25Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Updated 10 months ago
- ☆41Updated last year
- ☆23Updated 4 years ago
- attachments for forum of RealWorld CTF 3rd☆42Updated 4 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Updated 4 years ago
- A collection of resources and information about CVE-2023-2033☆19Updated 2 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆97Updated 2 years ago
- Code audit (code review) with VIM.☆17Updated 11 months ago
- COVA - A static analysis tool to compute path conditions☆39Updated 5 months ago
- ☆22Updated 6 years ago
- ☆66Updated 3 years ago
- 模糊测试种子库 comprehensive croups for fuzzing seeds with carfefully selected(rate=coverage/filesize)☆23Updated 4 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆76Updated last year
- blackhat usa 2022 I attended☆73Updated 3 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆184Updated last year
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆90Updated 7 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆83Updated last year
- The CTF challenges that I made☆18Updated 2 years ago
- Analyze IoT firmware☆17Updated 4 years ago
- ☆32Updated 2 years ago
- Challenge attachments for RWCTF 3rd.☆91Updated 4 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 3 years ago
- ☆64Updated 4 years ago