WALA 学习笔记
☆14Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for WALAStudy
Users that are interested in WALAStudy are comparing it to the libraries listed below
Sorting:
- neo4j plugin of ByteCodeDL for the IntelliJ Platform. ByteCodeDL-Neo4j-IDEA-Plugin☆16Dec 28, 2023Updated 2 years ago
- 简单实现的 Java RASP☆35Oct 14, 2020Updated 5 years ago
- TongASDP漏洞测试环境☆35Mar 22, 2023Updated 2 years ago
- solution to buggyLoader of 0CTF/TCTF 2021 Finals☆20Sep 27, 2021Updated 4 years ago
- Taint analysis implementation based on Heros and Soot☆45May 6, 2024Updated last year
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Mar 19, 2024Updated last year
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- A c0 -> LLVM IR compiler, with some optimization.☆13Jul 13, 2020Updated 5 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- Write Up Code of HITB Sec-Sin 2021 Make JDBC Attacks Brilliant Again☆14Jun 24, 2023Updated 2 years ago
- A declarative static analysis tool for jvm bytecode based Datalog like CodeQL☆345Jan 6, 2024Updated 2 years ago
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆69Oct 19, 2025Updated 4 months ago
- ☆65Sep 27, 2023Updated 2 years ago
- ☆38Oct 26, 2021Updated 4 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆77Oct 14, 2024Updated last year
- ☆41Mar 10, 2021Updated 4 years ago
- CTF platform for SUS☆16Jan 4, 2023Updated 3 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- generate facts from bytecode (source is https://github.com/plast-lab/doop-mirror/tree/master/generators)☆23Nov 24, 2024Updated last year
- Writeup and environment for XCTF2021Final-Dubbo☆44May 31, 2021Updated 4 years ago
- CTF stuff☆40Dec 5, 2022Updated 3 years ago
- ☆78Jan 12, 2021Updated 5 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆463Jan 15, 2026Updated last month
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- 【随机动态生成】php免杀webshell☆19Mar 28, 2022Updated 3 years ago
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆93Jan 17, 2023Updated 3 years ago
- JDBC Attack Tricks☆154Sep 3, 2023Updated 2 years ago
- 一款使用Yaml定义搜索规则来搜索Class的工具☆108Aug 2, 2023Updated 2 years ago
- 一个基于jvm-sandbox高度定制化rasp☆58Sep 28, 2023Updated 2 years ago
- Some ReadObject Sink With JDBC☆243May 8, 2024Updated last year
- ☆206Oct 27, 2025Updated 4 months ago
- Corax for Java: A general static analysis framework for java code checking.☆254Dec 3, 2024Updated last year
- Finding Java gadget chains with CodeQL☆184Jan 14, 2025Updated last year
- Basic Gradle configuration and example drivers to get started with WALA☆29Dec 2, 2024Updated last year
- A benchmark to evaluate taint analysis☆27Jun 20, 2022Updated 3 years ago
- Java Agent memory horse scanner combined with Call Graph modus☆65Dec 26, 2022Updated 3 years ago