Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.
☆28Oct 11, 2018Updated 7 years ago
Alternatives and similar repositories for security_taint_propagation
Users that are interested in security_taint_propagation are comparing it to the libraries listed below
Sorting:
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- ☆34Oct 18, 2013Updated 12 years ago
- ☆41Mar 10, 2021Updated 4 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 7 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Phosphor: Dynamic Taint Tracking for the JVM☆181Jun 17, 2025Updated 8 months ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆11Aug 12, 2022Updated 3 years ago
- ☆13Apr 8, 2019Updated 6 years ago
- A benchmark to evaluate taint analysis☆28Jun 20, 2022Updated 3 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 6 years ago
- ☆17Dec 9, 2022Updated 3 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆17Dec 22, 2025Updated 2 months ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- Java application written with javaparser framework for analyzing bad smells and class complexity☆16May 17, 2021Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- A collection of command-line tools based on Dyninst☆17Jun 3, 2021Updated 4 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- A points-to and alias analysis benchmark suite☆41Sep 24, 2018Updated 7 years ago
- 利用agent hock指定的class,在jar运行周期内,用于跟踪被执行的方法,辅助做一些事情,比如挖洞啊☆125Jul 17, 2020Updated 5 years ago
- Action to retrofit a CodeQL bundle with additional queries, libraries, and customizations☆27May 8, 2024Updated last year
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- ☆131Jun 17, 2022Updated 3 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- MySQL JDBC Deserialization Payload / MySQL客户端jdbc反序列化漏洞payload☆13Feb 8, 2020Updated 6 years ago