oliverklee / pixyLinks
Pixy is a scanner static code analysis tools that scans PHP applications for security vulnerabilities.
☆141Updated last year
Alternatives and similar repositories for pixy
Users that are interested in pixy are comparing it to the libraries listed below
Sorting:
- Taint Analysis for PHP☆45Updated 9 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- RIPS - A static source code analyser for vulnerabilities in PHP scripts☆360Updated 9 years ago
- ☆23Updated 6 years ago
- A PHP code transformer to provide protection against injection attacks☆10Updated 14 years ago
- Security-related PHP7 OPcache abuse tools and demo☆316Updated 2 years ago
- A tool that can scan php vulnerabilities automatically using static analysis methods☆491Updated 7 years ago
- CodeIgniter <=2.1.4 session cookie decryption vulnerability☆39Updated 9 years ago
- RIPS - A static source code analyser for vulnerabilities in PHP scripts☆322Updated 3 years ago
- Collection of vulnerable and fixed PHP synthetic test cases☆63Updated last year
- OWASP WAP - Web Application Protection Project☆11Updated 6 years ago
- Deprecated: Please visit https://github.com/github/codeql instead.☆80Updated 3 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆15Updated 6 years ago
- ☆46Updated 9 years ago
- A static analysis tool for security☆350Updated last month
- Deemon is a tool to detect CSRF in web applications. Deemon has been used for the paper "Deemon: Detecting CSRF with Dynamic Analysis and…☆74Updated 7 years ago
- ☆90Updated 4 years ago
- A PHP static code analyser for potential vulnerabilities☆29Updated 10 years ago
- PHP parser written in Python using PLY☆371Updated 2 years ago
- ☆81Updated 4 years ago
- ☆86Updated 8 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆55Updated 9 years ago
- procfs-based PHP sandbox bypass☆134Updated 7 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- Challenges I created for 35c3☆48Updated 6 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 10 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34Updated 6 years ago