olivo / TaintPHP
Taint Analysis for PHP
☆44Updated 8 years ago
Related projects: ⓘ
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆33Updated 4 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆30Updated 5 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆16Updated 5 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆22Updated 7 months ago
- ☆28Updated this week
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆28Updated 6 years ago
- Pixy is a scanner static code analysis tools that scans PHP applications for security vulnerabilities.☆132Updated 8 months ago
- ☆67Updated 4 years ago
- ☆23Updated 5 years ago
- Challenges I created for 35c3☆48Updated 5 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Updated 5 years ago
- procfs-based PHP sandbox bypass☆133Updated 6 years ago
- ☆35Updated 5 years ago
- PHP Open Iast Agent☆9Updated 5 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆87Updated 9 months ago
- ☆18Updated 5 years ago
- A PHP code transformer to provide protection against injection attacks☆10Updated 13 years ago
- Browser Fuzz Summarize / 浏览器模糊测试综述☆136Updated 3 years ago
- My Real World CTF challenges☆115Updated 5 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- Collection of vulnerable and fixed PHP synthetic test cases☆57Updated 11 months ago
- ctf challenges by salt☆16Updated 5 years ago
- gamebox admin scripts for DEF CON 22~23 CTF Finals☆15Updated 8 years ago
- ☆40Updated last year
- Challenge Sources & Exploits for the 34C3 CTF☆114Updated 6 years ago
- Vulnerability Verification Environment based on Docker☆111Updated 5 years ago
- Hence☆21Updated 5 years ago
- realworld ctf live stream☆74Updated 7 months ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆53Updated 2 years ago