☆43Jan 30, 2023Updated 3 years ago
Alternatives and similar repositories for TChecker
Users that are interested in TChecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- ☆242Jan 27, 2019Updated 7 years ago
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆27Feb 19, 2024Updated 2 years ago
- ☆17Apr 7, 2023Updated 2 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- 安全本应纯粹,规避内卷,用一杯咖啡回归安全的乐趣!SEC.CAFE 安全咖啡是一个安全爱好者的服务平台与社区。☆52Feb 21, 2025Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- ☆19Feb 1, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆18Jun 14, 2024Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- ☆11Sep 6, 2024Updated last year
- ☆15Mar 19, 2022Updated 4 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago
- ☆15Apr 28, 2017Updated 8 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- ☆34Apr 17, 2021Updated 4 years ago
- ☆61Apr 24, 2023Updated 2 years ago
- A robust parser for C/C++ storing abstract syntax trees, control flow graphs and program dependence graphs in a neo4j graph database.☆555May 10, 2019Updated 6 years ago
- ☆20Jan 19, 2026Updated 2 months ago
- tool of llm-based indirect-call analyzer☆30Feb 18, 2025Updated last year
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- ☆18Dec 2, 2018Updated 7 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆468Jan 15, 2026Updated 2 months ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- 用于备份CTF比赛题目,仅队内复现使用☆15Apr 17, 2022Updated 3 years ago
- YASA is an open-source static program analysis project. Its core innovation lies in a unified intermediate representation called UAST, d…☆255Mar 5, 2026Updated 3 weeks ago