iohehe / papers_collectionLinks
☆11Updated 2 years ago
Alternatives and similar repositories for papers_collection
Users that are interested in papers_collection are comparing it to the libraries listed below
Sorting:
- ☆58Updated 2 years ago
- ☆43Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆36Updated 5 years ago
- ☆22Updated 3 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆25Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆12Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Updated 4 months ago
- ☆16Updated 3 years ago
- ☆27Updated last year
- ☆14Updated 5 years ago
- ☆25Updated 3 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆96Updated 2 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆183Updated last year
- Witcher is the first framework for using AFL to fuzz web applications.☆102Updated 2 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆73Updated last year
- ☆18Updated last year
- 存储iot设备分析工具和分析文件☆14Updated 4 years ago
- A benchmark for Java gadget chain detecting algorithms.☆14Updated 5 months ago
- Artifact for ICSE 2023☆50Updated 3 years ago
- ☆29Updated 3 years ago
- Challenge attachments for RWCTF 3rd.☆91Updated 4 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Updated 4 years ago
- ☆15Updated last year
- A benchmark to evaluate taint analysis☆28Updated 3 years ago
- My CTF Writeup☆28Updated last year
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78Updated 3 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆25Updated 4 years ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Updated last year
- A docker environment for pwn in ctf☆22Updated 2 years ago
- writeups for our challenges☆147Updated 2 years ago