☆17Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for Respector
Users that are interested in Respector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jul 3, 2022Updated 3 years ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated 3 weeks ago
- ☆11Sep 7, 2023Updated 2 years ago
- Tool for detecting error handling bugs☆23Sep 11, 2016Updated 9 years ago
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 国科大编译作业:基于Clang的C语言解释执行器☆43Dec 12, 2021Updated 4 years ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 3 years ago
- A framework for automated black-box testing of RESTful APIs.☆62Dec 21, 2025Updated 3 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- [NeurIPS 2025] CodeCrash: Exposing LLM Fragility to Misleading Natural Language in Code Reasoning☆17Jan 24, 2026Updated 2 months ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- The Web Application Hacker's Handbook 2 (Web应用黑客手册第二版翻译)☆20May 25, 2025Updated 10 months ago
- Cargo is part of the Minerva project working on refactoring monoliths to microservices☆11Sep 17, 2025Updated 6 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- GitHub Action to add reviewer(s) to a pull request.☆12Apr 23, 2024Updated last year
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 5 months ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated 2 weeks ago
- ☆20Dec 4, 2023Updated 2 years ago
- ☆16Aug 28, 2014Updated 11 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- ☆29Dec 11, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- serverless framework sample that shows how to combine a load balancer with a lambda☆12Jun 30, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source Code for 'The Definitive Guide to AWS Application Integration' by Jyothi Prasad Buddha and Reshma Beesetty☆14May 7, 2023Updated 2 years ago
- Experimental treesitter based language server. 😆☆17Mar 20, 2023Updated 3 years ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- ☆14Feb 4, 2020Updated 6 years ago
- MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency☆20Dec 21, 2024Updated last year
- ☆25Mar 26, 2025Updated last year
- methodology for modernizing applications to Kubernetes☆18Sep 2, 2022Updated 3 years ago