ANTLR 3 fuzzy parser
☆49Jan 21, 2013Updated 13 years ago
Alternatives and similar repositories for codesensor
Users that are interested in codesensor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Python utilities for joern☆36Nov 13, 2018Updated 7 years ago
- A python interface to joern (deprecated).☆34Nov 13, 2018Updated 7 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Pure OCaml IKEv2☆14Nov 15, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 14 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Binary analysis platform based on Octopus and Radare2☆77Nov 7, 2016Updated 9 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Content Anomaly Detector based on n-Grams☆24Jun 17, 2016Updated 9 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Bash script to test executable properties like (PIE, RELRO, PaX, Canaries, ASLR). (Version derivated from the original one trapkit.de/too…☆24Oct 6, 2013Updated 12 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- vulnerability detection in python source code with LSTM networks☆153Mar 17, 2020Updated 6 years ago
- A Mocktail of Source Code Representations - Consolidated Pipeline☆10Nov 6, 2022Updated 3 years ago
- A robust parser for C/C++ storing abstract syntax trees, control flow graphs and program dependence graphs in a neo4j graph database.☆557May 10, 2019Updated 6 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Toy genetic algorithm with GUI☆11Jun 13, 2015Updated 10 years ago
- A program to draw rectangles from heap traces.☆135Feb 27, 2020Updated 6 years ago
- ☆350Oct 24, 2024Updated last year
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆348Nov 17, 2020Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- A series of dynamic analysis tools for Binary Ninja, built with PyQt and Binjatron☆20Oct 23, 2020Updated 5 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Magisk Module containing the minimal software/framework/firmware for NFC functionality for NXP controllers, future plans for a hook for N…☆10Jun 30, 2023Updated 2 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- A Chrome extension to easily toggle proxy settings☆17Feb 8, 2015Updated 11 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- Symbolic Liveness Analysis of real-world software building upon KLEE to detect liveness violations (e.g. infinite loop bugs)☆12Dec 16, 2021Updated 4 years ago