cuhk-seclab / XSymView external linksLinks
☆15Mar 19, 2022Updated 3 years ago
Alternatives and similar repositories for XSym
Users that are interested in XSym are comparing it to the libraries listed below
Sorting:
- ☆13Mar 19, 2022Updated 3 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- Taint Analysis for PHP☆45Apr 17, 2016Updated 9 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆26Nov 30, 2021Updated 4 years ago
- Overcooked! 2 TAS Development Framework☆10Aug 18, 2023Updated 2 years ago
- LLM-powered tool that enhances OpenAPI specifications by extracting machine-readable constraints from human-readable descriptions.☆14Nov 6, 2024Updated last year
- ☆10Sep 6, 2024Updated last year
- ☆242Jan 27, 2019Updated 7 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- The Universal Algebra Calculator☆16Jun 11, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Visualize NFA and DFA constructed from regular exrepssion☆18Feb 10, 2017Updated 9 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- ☆42Jan 30, 2023Updated 3 years ago
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 11 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Exploit code by DirtyChain☆11Apr 11, 2025Updated 10 months ago
- ☆12Jan 7, 2024Updated 2 years ago
- ☆13Oct 30, 2023Updated 2 years ago
- This is an unofficial read-only mirror of the gem5 simulator. The upstream repository is stored in Mercurial at http://repo.gem5.org/gem5…☆13May 2, 2020Updated 5 years ago
- A known vulnerable Flask app with an excessive amount of automated testing☆13Feb 6, 2026Updated last week
- KNN, KMeans, Decision Tree, Naive Bayesian, Linear Regression, Principal Component Analysis, Neural Networks, Support Vector Machines al…☆11Jun 30, 2020Updated 5 years ago
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- ☆11Sep 16, 2021Updated 4 years ago
- Ensemble learning with graph neural networks for disease module discovery and classification☆11Nov 5, 2023Updated 2 years ago
- Buttercup CRS as submitted to the AIxCC Final Competition☆95Jul 14, 2025Updated 7 months ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 5 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Benchmark collection for analysis. The idea is to have a collection of projects in several languages as well as various sast applications…☆12Jan 7, 2021Updated 5 years ago
- Automatic hacking tool for URL regexes.☆11Feb 12, 2021Updated 5 years ago
- ☆14Jun 16, 2021Updated 4 years ago