Template for the Informatics Research Review
☆28Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for IRR-Template
Users that are interested in IRR-Template are comparing it to the libraries listed below
Sorting:
- Course material for Blockchains and Distributed Ledgers (INFR11144)☆33Nov 25, 2025Updated 3 months ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- Code for Learned Thresholds Token Merging and Pruning for Vision Transformers (LTMP). A technique to reduce the size of Vision Transforme…☆17Nov 24, 2024Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- PWNable pyjail☆13Jan 13, 2025Updated last year
- The prototype implementation of our USENIX 2023 paper☆15Apr 25, 2023Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- just a toy operating system for fun☆18Oct 16, 2014Updated 11 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- The Z3-Noodler String Solver☆25Feb 27, 2026Updated last week
- ☆14Feb 4, 2020Updated 6 years ago
- Code for "CP-ViT: Cascade Vision Transformer Pruning via Progressive Sparsity Prediction" on CIFAR-10/100.☆14Dec 10, 2021Updated 4 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- 大网段端口开放扫描器☆14May 21, 2019Updated 6 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- The repo of "BugLens"☆35Nov 12, 2025Updated 3 months ago
- Compiler development environment.☆21Feb 16, 2026Updated 2 weeks ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆47Feb 12, 2026Updated 3 weeks ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- ☆27Dec 29, 2024Updated last year
- ☆23Apr 6, 2019Updated 6 years ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- Code for the paper "LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference" at ASE 2024☆26Sep 3, 2024Updated last year
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆22Jan 23, 2025Updated last year
- ☆18Dec 25, 2024Updated last year
- 用于搭建VSCode开发环境的测试例程☆18Mar 20, 2021Updated 4 years ago
- ☆29Feb 26, 2026Updated last week
- ☆22Jul 3, 2022Updated 3 years ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Jul 17, 2025Updated 7 months ago
- The notes are the supplement to papers and handouts of CS 259D☆21May 4, 2018Updated 7 years ago
- ☆21Apr 30, 2021Updated 4 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Aug 22, 2025Updated 6 months ago
- Pwn 比赛小工具☆34Dec 27, 2025Updated 2 months ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆46Feb 21, 2026Updated last week
- A simple microkernel operating system☆22Oct 25, 2015Updated 10 years ago