Industrial Cybersecurity Conference Index
☆13Mar 11, 2024Updated last year
Alternatives and similar repositories for ICCI
Users that are interested in ICCI are comparing it to the libraries listed below
Sorting:
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- ☆14Dec 25, 2023Updated 2 years ago
- xsleaks-wiki 中文版☆15May 31, 2022Updated 3 years ago
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- ☆206Oct 27, 2025Updated 4 months ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆46Feb 21, 2026Updated last week
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆49Dec 4, 2023Updated 2 years ago
- ☆57Aug 6, 2024Updated last year
- The source code of [Sec'25] Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents☆53Sep 9, 2025Updated 5 months ago
- 静态分析基础教程☆180Jan 3, 2026Updated 2 months ago
- ☆65Sep 27, 2023Updated 2 years ago
- BugScan Documentation(BugScan 插件开发文档)☆25Aug 27, 2018Updated 7 years ago
- ☆32May 27, 2024Updated last year
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- The gym landing page created with React offers a dynamic and user-friendly interface for visitors interested in fitness and wellness. The…☆19Apr 24, 2024Updated last year
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- A vul-finder for loading CPG and automated finding vul-call-chains☆71Jul 22, 2025Updated 7 months ago
- A declarative static analysis tool for jvm bytecode based Datalog like CodeQL☆345Jan 6, 2024Updated 2 years ago
- CVE-2024-37051 poc and exploit☆29Jun 11, 2024Updated last year
- The source code of [S&P'25] Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.☆64Nov 20, 2025Updated 3 months ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- data story tech-blog☆10Jul 21, 2023Updated 2 years ago
- A neo4j procedure for tabby☆137May 17, 2025Updated 9 months ago
- Java Js Engine Payloads All in one☆289Aug 21, 2023Updated 2 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆44Feb 20, 2026Updated 2 weeks ago
- The next-generation AI Agent framework driven by Intent Engineering. Move beyond turn-based Function Calling to embrace code-level intent…☆71Jan 11, 2026Updated last month
- CodeQL zero to hero blog post series challenges☆164Sep 29, 2025Updated 5 months ago
- 简单实现的 Java RASP☆35Oct 14, 2020Updated 5 years ago
- ☕ A Distributed Task Scheduling System is a software infrastructure that allows for the distribution and execution of tasks across multi…☆26May 26, 2025Updated 9 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Opengl based 3D real time PBR render engine.☆10Dec 24, 2023Updated 2 years ago
- This repository provides an online certification program in Data Science and Machine Learning offered by IBM and Coursera. The program co…☆14Jun 26, 2023Updated 2 years ago