☆29Apr 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for flatgraph
Users that are interested in flatgraph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 7 months ago
- ShiftLeft OverflowDB☆136May 22, 2025Updated 11 months ago
- The heart & core of Privado code scanner☆33Nov 21, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 10 months ago
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 9 months ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆29Jan 27, 2025Updated last year
- Source code of SEmu-Fuzz☆24Nov 30, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 8 months ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆87Mar 5, 2024Updated 2 years ago
- ☆14Feb 4, 2020Updated 6 years ago
- The repo of "BugLens"☆40Nov 12, 2025Updated 5 months ago
- ☆21Apr 30, 2021Updated 4 years ago
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆441Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Apr 9, 2026Updated 2 weeks ago
- Code Property Graph: specification, query language, and utilities☆573Apr 15, 2026Updated 2 weeks ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆100Apr 21, 2024Updated 2 years ago
- An exploration of Android App Functions☆17May 26, 2025Updated 11 months ago
- An Interactive Hex-Rays Microcode Explorer☆17Feb 8, 2024Updated 2 years ago
- Lessons for syntaxflow zero to hero☆56Sep 14, 2024Updated last year
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77May 12, 2022Updated 3 years ago
- Writeup and exploit for CVE-2025-22441: Privilege escalation from installed app to SystemUI process on Android due to pass of untrusted A…☆100Oct 8, 2025Updated 6 months ago
- Rerousces related to time-travel debugging (TTD)☆40Jan 6, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Aug 8, 2019Updated 6 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆16Jun 5, 2024Updated last year
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 6 years ago
- ☆31May 1, 2025Updated 11 months ago
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 6 months ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Testability Pattern Catalogs for SAST☆34Feb 18, 2025Updated last year
- ☆15Jul 13, 2023Updated 2 years ago
- ☆15Mar 22, 2021Updated 5 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆46Feb 20, 2026Updated 2 months ago
- Coverage gathering JVMTI agent for Android☆26Oct 11, 2023Updated 2 years ago
- peda like debugger script for windbg/windbgx and mingw-gdb☆11Dec 31, 2021Updated 4 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆21Jul 28, 2025Updated 9 months ago