☆32May 1, 2025Updated 10 months ago
Alternatives and similar repositories for fast
Users that are interested in fast are comparing it to the libraries listed below
Sorting:
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Testability Pattern Catalogs for SAST☆32Feb 18, 2025Updated last year
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆165Jan 29, 2024Updated 2 years ago
- ☆10Sep 25, 2024Updated last year
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Feb 26, 2022Updated 4 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- ☆19Sep 7, 2025Updated 6 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- A benchmark to evaluate taint analysis☆28Jun 20, 2022Updated 3 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- 一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务,下个版本将会大更新。☆113Jan 30, 2026Updated last month
- Analysis for access-control vulnerabilities in Java Spring Security applications.☆14May 25, 2022Updated 3 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- ☆14Feb 4, 2020Updated 6 years ago
- The Z3-Noodler String Solver☆25Feb 27, 2026Updated last week
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆23Dec 10, 2025Updated 2 months ago
- The repo of "BugLens"☆35Nov 12, 2025Updated 3 months ago
- ☆47May 27, 2023Updated 2 years ago
- COVA - A static analysis tool to compute path conditions☆40Updated this week
- A program slicer for Java, based on the system dependence graph (SDG).☆70Feb 27, 2026Updated last week
- Tensorflow实现 seq2seq,并训练实现英-中翻译☆16Aug 27, 2018Updated 7 years ago
- Source code of PurPliance analysis tool.☆18Mar 11, 2024Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- An SMT Solver for string constraints☆49Feb 10, 2026Updated 3 weeks ago
- Code for the paper "LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference" at ASE 2024☆26Sep 3, 2024Updated last year
- ☆19Jun 27, 2023Updated 2 years ago
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆22Jan 23, 2025Updated last year
- ☆29Updated this week
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- ☆43Jan 30, 2023Updated 3 years ago
- ☆21Apr 30, 2021Updated 4 years ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Jul 17, 2025Updated 7 months ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Awesome materials for software supply chain security☆18May 13, 2020Updated 5 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Oct 5, 2022Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated last year
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago