kaist-plrg / jestLinks
JEST: N+1-version Differential Testing of Both JavaScript Engines
☆14Updated 4 years ago
Alternatives and similar repositories for jest
Users that are interested in jest are comparing it to the libraries listed below
Sorting:
- JISET: JavaScript IR-based Semantics Extraction Toolchain☆41Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆48Updated last year
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- ☆63Updated last month
- ☆28Updated 2 years ago
- Scalable Analysis Framework for ECMAScript☆118Updated 4 years ago
- UT based automated fuzz driver generation☆167Updated 5 months ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆87Updated last year
- ☆46Updated 11 months ago
- autofz: Automated Fuzzer Composition at Runtime☆82Updated 2 years ago
- The Art, Science, and Engineering of Fuzzing: A Survey☆225Updated 2 weeks ago
- american fuzzy lop - a security-oriented fuzzer☆10Updated last year
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆16Updated 3 months ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆22Updated 7 months ago
- ☆11Updated last year
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆155Updated 6 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Updated 3 years ago
- ☆68Updated 2 years ago
- A collection of online resources that I found useful for Ph.D. students☆17Updated 3 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Updated 6 years ago
- ☆42Updated 2 years ago
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- A collection of links related to Korean products hacking☆93Updated last month
- Public Source code Release of Theori's AIxCC AFC Submission☆166Updated 2 months ago
- ☆105Updated last year
- ☆78Updated 3 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Updated 3 years ago
- ☆26Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆90Updated 3 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 11 months ago