☆45Jan 30, 2023Updated 3 years ago
Alternatives and similar repositories for TChecker
Users that are interested in TChecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 6 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆16Oct 3, 2024Updated last year
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆99Nov 27, 2023Updated 2 years ago
- ☆242Jan 27, 2019Updated 7 years ago
- Artifact for ICSE 2023☆52Sep 24, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆27Feb 19, 2024Updated 2 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- 安全本应纯粹,规避内卷,用一杯咖啡回归安全的乐趣!SEC.CAFE 安全咖啡是一个安全爱好者的服务平台与社区。☆52Apr 27, 2026Updated last week
- ☆13Mar 19, 2022Updated 4 years ago
- A benchmark for Java gadget chain detecting algorithms.☆16Jun 20, 2025Updated 10 months ago
- ☆19Feb 1, 2016Updated 10 years ago
- ☆10Mar 5, 2023Updated 3 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Mar 22, 2026Updated last month
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- ☆11Apr 21, 2026Updated 2 weeks ago
- ☆15Mar 19, 2022Updated 4 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago
- ☆15Apr 28, 2017Updated 9 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated 2 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆34Apr 17, 2021Updated 5 years ago
- ☆62Apr 24, 2023Updated 3 years ago
- A robust parser for C/C++ storing abstract syntax trees, control flow graphs and program dependence graphs in a neo4j graph database.☆557May 10, 2019Updated 6 years ago
- 通过微信公众号推送漏洞消息☆18Dec 27, 2021Updated 4 years ago
- ☆20Jan 19, 2026Updated 3 months ago
- tool of llm-based indirect-call analyzer☆31Feb 18, 2025Updated last year
- ☆23Nov 10, 2023Updated 2 years ago
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- ☆18Dec 2, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆474Apr 14, 2026Updated 3 weeks ago
- 用于备份CTF比赛题目,仅队内复现使用☆15Apr 17, 2022Updated 4 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 9 months ago
- The prototype implementation of our USENIX 2023 paper☆15Apr 25, 2023Updated 3 years ago