JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently
☆10Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for joanaudit
Users that are interested in joanaudit are comparing it to the libraries listed below
Sorting:
- FlowBlot is static code analysis benchmark project by Codethreat, including sink-source challenges grouped into various technical analysi…☆18Feb 9, 2024Updated 2 years ago
- ☆20May 12, 2016Updated 9 years ago
- ☆15Jul 11, 2018Updated 7 years ago
- Java bytecode generator for sound and precise partial program analysis☆24Jun 4, 2021Updated 4 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated last month
- A generic AST generator for parser development.☆33Feb 10, 2019Updated 7 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Ohloh API examples☆94Mar 4, 2025Updated last year
- Joana - Information Flow Control for Java☆95Dec 22, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 7 months ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆11Jan 3, 2021Updated 5 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆11Nov 7, 2025Updated 4 months ago
- Personal Security Blog☆13Nov 4, 2024Updated last year
- Prometheus Service Discovery for Docker Container.☆11Sep 24, 2025Updated 5 months ago
- ☆17Oct 30, 2023Updated 2 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A tool to check for potential open source licensing problems.☆12Aug 17, 2016Updated 9 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- A parallel multi-core system emulator based on QEMU☆19Jun 26, 2012Updated 13 years ago
- ☆10Mar 20, 2020Updated 5 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- A library that records Emacs inter-key timings.☆10Oct 11, 2017Updated 8 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Generates LLVM IR for Xcode Projects☆10Jan 8, 2026Updated 2 months ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- ☆10Oct 2, 2017Updated 8 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago