☆11Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for papers_collection
Users that are interested in papers_collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Mar 19, 2022Updated 4 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Jan 27, 2019Updated 7 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- ☆43Jan 30, 2023Updated 3 years ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated 3 weeks ago
- ☆61Apr 24, 2023Updated 2 years ago
- Search-based Test Data Generation for Relational Database Schemas☆24Mar 24, 2021Updated 4 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆45Feb 20, 2026Updated last month
- Automatic hacking tool for URL regexes.☆11Feb 12, 2021Updated 5 years ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- Collection of vulnerable and fixed PHP synthetic test cases☆65Oct 15, 2023Updated 2 years ago
- ☆242Jan 27, 2019Updated 7 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- web登录密码爆破☆14Jul 31, 2019Updated 6 years ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Taint Analysis for PHP☆45Apr 17, 2016Updated 9 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Jan 29, 2026Updated last month
- A Z3-Based String Constraint Solver☆87Jan 1, 2020Updated 6 years ago
- ☆17Dec 30, 2023Updated 2 years ago
- A Control Flow Graph implementation in PHP☆246Sep 20, 2025Updated 6 months ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 5 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated last week
- 华中科技大学物理网考题库☆11Dec 13, 2018Updated 7 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- ☆12Jan 7, 2024Updated 2 years ago
- Cisco RV042/016/082 Router Firmware☆14Mar 8, 2020Updated 6 years ago
- A coverage-guided REST API fuzzer developed on top of LibAFL☆173Mar 16, 2026Updated last week