cuhk-seclab / TCheckerLinks
☆39Updated 2 years ago
Alternatives and similar repositories for TChecker
Users that are interested in TChecker are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- ☆29Updated last month
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆11Updated 7 months ago
- ☆25Updated 2 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆175Updated 9 months ago
- ☆16Updated 3 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆70Updated 10 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 8 months ago
- Works about detecting vulnerable using ML.☆84Updated 5 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆64Updated last week
- ☆10Updated last year
- ☆48Updated 2 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆14Updated 8 months ago
- ☆13Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆36Updated 5 years ago
- Awesome Large Language Models for Vulnerability Detection☆160Updated this week
- ☆25Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆13Updated 3 weeks ago
- ☆17Updated 10 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆75Updated last year
- FirmSec Dataset☆10Updated 3 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- ☆21Updated 2 years ago
- Artifact for ICSE 2023☆49Updated 2 years ago
- 一个搜索网络安全领域顶会论文的小工具☆86Updated 7 months ago