julianthome / joanauditView external linksLinks
JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently
☆10Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for joanaudit
Users that are interested in joanaudit are comparing it to the libraries listed below
Sorting:
- FlowBlot is static code analysis benchmark project by Codethreat, including sink-source challenges grouped into various technical analysi…☆18Feb 9, 2024Updated 2 years ago
- ☆20May 12, 2016Updated 9 years ago
- ☆15Jul 11, 2018Updated 7 years ago
- Java bytecode generator for sound and precise partial program analysis☆24Jun 4, 2021Updated 4 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 3 weeks ago
- A generic AST generator for parser development.☆33Feb 10, 2019Updated 7 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Ohloh API examples☆94Mar 4, 2025Updated 11 months ago
- Joana - Information Flow Control for Java☆95Dec 22, 2021Updated 4 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 7 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆11Nov 7, 2025Updated 3 months ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- ☆11Jan 3, 2021Updated 5 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Personal Security Blog☆13Nov 4, 2024Updated last year
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- A library for parsing security advisories☆13Feb 5, 2026Updated last week
- esp32 based scoring device for fencing☆14Aug 22, 2025Updated 5 months ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- A parallel multi-core system emulator based on QEMU☆19Jun 26, 2012Updated 13 years ago
- Accmut is a framework for acclerating mutation testing, which is based on LLVM-IR.☆10Jan 25, 2018Updated 8 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- ☆10Oct 2, 2017Updated 8 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- SlackMan - Slackware Package Manager☆10Jan 4, 2019Updated 7 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago