☆11May 18, 2021Updated 4 years ago
Alternatives and similar repositories for Revealer
Users that are interested in Revealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection☆81Dec 14, 2022Updated 3 years ago
- A library for finite automata and regular expressions in the context of JS RegExp☆30Jun 16, 2024Updated last year
- Automatically generates schema given json samples.☆10Jun 1, 2016Updated 9 years ago
- An ANTLR 4 grammar for PCRE☆30Jun 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MutRex - A generator of fault detecting strings for regular expressions☆12Mar 18, 2024Updated 2 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 9 months ago
- ☆32Dec 24, 2021Updated 4 years ago
- A tool to perform static analysis on regexes to determine whether they are vulnerable to ReDoS.☆112Jul 6, 2022Updated 3 years ago
- A dk.brics FSM to regular-expression-string converter☆10Jul 12, 2025Updated 9 months ago
- Portable Executable Header Viewer☆12Jan 29, 2025Updated last year
- ☆19Nov 7, 2024Updated last year
- ☆15Feb 15, 2023Updated 3 years ago
- ☆11Apr 10, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- Deterministic Regular Expressions with Backreferences☆20Oct 12, 2020Updated 5 years ago
- peda like debugger script for windbg/windbgx and mingw-gdb☆11Dec 31, 2021Updated 4 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆17Dec 20, 2021Updated 4 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Benchmark tools for C☆16Apr 3, 2015Updated 11 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Jun 22, 2025Updated 9 months ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- Fast Wasm interpreter in Rust☆16May 7, 2022Updated 3 years ago
- 🎶 MIDI File Metadata Editor☆17Mar 30, 2026Updated 2 weeks ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆25Dec 10, 2025Updated 4 months ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated 2 years ago
- Making Smart Contract Development More Secure and Easier☆23Apr 26, 2022Updated 3 years ago
- A focus monitor app for Windows☆14Feb 17, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A simple Joern MCP Server.☆38Nov 14, 2025Updated 5 months ago
- List of RegEx DoS (ReDoS) CVEs and resources☆30Feb 6, 2023Updated 3 years ago
- A fuzzer for the CAN bus☆18Mar 1, 2025Updated last year
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- 利用wasm静态免杀的demo☆16Apr 11, 2024Updated 2 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago