cuhk-seclab / TChecker
☆38Updated 2 years ago
Alternatives and similar repositories for TChecker:
Users that are interested in TChecker are comparing it to the libraries listed below
- ☆26Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 6 months ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 5 months ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆35Updated 4 years ago
- ☆15Updated 3 years ago
- ☆10Updated last year
- ☆13Updated 3 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆168Updated 6 months ago
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- ☆24Updated 2 years ago
- ☆46Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆66Updated 8 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆74Updated last year
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 3 years ago
- ☆27Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 2 years ago
- ☆21Updated 2 years ago
- ☆24Updated 2 years ago
- FirmSec Dataset☆10Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆116Updated 3 years ago
- A collection of security papers on top-tier publications☆43Updated this week
- oh my soot !☆90Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆13Updated 4 months ago
- ☆20Updated 3 years ago
- ☆16Updated last year
- Some test samples for CPG execution logic.☆21Updated last year
- Taint analysis implementation based on Heros and Soot☆44Updated 11 months ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆22Updated 2 years ago