cuhk-seclab / TChecker
☆36Updated 2 years ago
Alternatives and similar repositories for TChecker:
Users that are interested in TChecker are comparing it to the libraries listed below
- ☆24Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 4 months ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆35Updated 4 years ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 3 months ago
- ☆25Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆162Updated 5 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆63Updated 6 months ago
- Some test samples for CPG execution logic.☆20Updated 10 months ago
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- ☆22Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆45Updated 3 weeks ago
- ☆14Updated 2 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- ☆24Updated 2 years ago
- ☆13Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆41Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆112Updated 3 years ago
- ☆10Updated 6 months ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆18Updated last year
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 3 years ago
- oh my soot !☆88Updated 2 years ago
- ☆46Updated last year
- Artifact for ICSE 2023☆46Updated 2 years ago
- 一个搜索网络安全领域顶会论文的小工具☆85Updated 3 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆74Updated 11 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆12Updated 2 months ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆93Updated last year
- A benchmark to evaluate taint analysis☆30Updated 2 years ago