Repository to showcase various configuration recipes with various technologies
☆36Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for find-sec-bugs-demos
Users that are interested in find-sec-bugs-demos are comparing it to the libraries listed below
Sorting:
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 27, 2026Updated last week
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆12May 31, 2018Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- ☆16Oct 8, 2025Updated 5 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- Code from MSc thesis on combining learning and fuzzing☆19Jul 30, 2018Updated 7 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- ☆29Aug 15, 2021Updated 4 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆66May 12, 2023Updated 2 years ago
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆62May 17, 2021Updated 4 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Summary of static analysis in Java and C/C++☆18Aug 11, 2022Updated 3 years ago
- ☆33Updated this week
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Mar 29, 2018Updated 7 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- Vulnerable Java based Web Application☆270Jun 20, 2024Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 7 months ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- ☆10Aug 18, 2021Updated 4 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- ☆11May 1, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago