☆11Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for papers_collection
Users that are interested in papers_collection are comparing it to the libraries listed below
Sorting:
- ☆13Mar 19, 2022Updated 3 years ago
- ☆15Mar 19, 2022Updated 3 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆103Nov 28, 2023Updated 2 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- ☆42Jan 30, 2023Updated 3 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- ☆61Apr 24, 2023Updated 2 years ago
- Search-based Test Data Generation for Relational Database Schemas☆24Mar 24, 2021Updated 4 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Collection of vulnerable and fixed PHP synthetic test cases☆66Oct 15, 2023Updated 2 years ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆44Feb 20, 2026Updated last week
- ☆10Feb 5, 2025Updated last year
- COVA - A static analysis tool to compute path conditions☆40Updated this week
- ☆242Jan 27, 2019Updated 7 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 4 months ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Jan 29, 2026Updated last month
- A Z3-Based String Constraint Solver☆87Jan 1, 2020Updated 6 years ago
- This is a general purpose wrapper for converting Datalog queries to Neo4J graph database☆10Dec 9, 2016Updated 9 years ago
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- BeyondTrust Endpoint Privilege Management☆12Jun 11, 2025Updated 8 months ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- A plugin that integrate MOSS and JPlag to Moodle and provide other useful features☆11May 23, 2019Updated 6 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated 11 months ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- A xss target for practicing☆10Feb 22, 2017Updated 9 years ago
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago