adamdoupe / enemy-of-the-stateLinks
This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.
☆19Updated 5 years ago
Alternatives and similar repositories for enemy-of-the-state
Users that are interested in enemy-of-the-state are comparing it to the libraries listed below
Sorting:
- COVA - A static analysis tool to compute path conditions☆40Updated 6 months ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34Updated 6 years ago
- This is the project of LearnAFL.☆28Updated 5 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Updated 6 years ago
- Joern Workshops☆29Updated 11 months ago
- ☆19Updated 9 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Updated 6 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆31Updated 7 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29Updated 4 years ago
- Result files from various fuzzing runs☆16Updated 4 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 3 years ago
- Downloader for Firefox/jsshell/Thunderbird builds for fuzzing.☆43Updated last month
- Materials from Fuzzing Bay Area meetups☆57Updated 6 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- ☆47Updated 5 years ago
- ☆18Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Updated 7 years ago
- DOM fuzzers - not maintained anymore☆17Updated 6 years ago
- CodeQL workshops for GitHub Universe☆96Updated 3 years ago
- ☆17Updated 2 years ago
- ☆23Updated 6 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 5 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 5 years ago
- CTF writeup for learning☆22Updated 4 years ago
- ☆29Updated 5 years ago
- experiments for IJON☆12Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Updated 4 years ago