p-march / v8-taintLinks
JITed Taint Tracking in V8
☆15Updated 11 years ago
Alternatives and similar repositories for v8-taint
Users that are interested in v8-taint are comparing it to the libraries listed below
Sorting:
- JavaScript virtual machine for WebAssembly and Taint Tracking security tool☆14Updated 8 years ago
- A Dynamic Symbolic Execution (DSE) engine for JavaScript. ExpoSE is highly scalable, compatible with recent JavaScript standards, and sup…☆218Updated 11 months ago
- gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.☆259Updated 5 years ago
- Surku is a general-purpose mutation-based fuzzer.☆79Updated 3 years ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Updated 2 years ago
- An AFL-inspired genetic fuzz tester for JavaScript☆132Updated 10 months ago
- A fuzzing library in JavaScript. ✨☆117Updated 3 weeks ago
- Line-based testcase reducer☆100Updated 3 weeks ago
- Performant taint analysis for Node.js☆55Updated last year
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆36Updated 9 years ago
- Fuzzinator Random Testing Framework☆194Updated last month
- Dynamic analysis framework for JavaScript☆475Updated last week
- A fuzzing management tools collection☆201Updated this week
- Path based Dynamic Analysis☆118Updated 8 years ago
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- Extension library for the Kitty fuzzing framework☆80Updated 5 years ago
- Learning framework for program property prediction☆217Updated 4 years ago
- ☆36Updated 8 months ago
- Available for legacy purposes. New users please see Jalangi2 https://github.com/Samsung/jalangi2☆122Updated 10 years ago
- A Z3-Based String Constraint Solver☆87Updated 6 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18Updated 4 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆78Updated 4 years ago
- Creates a CFG from JavaScript source code.☆70Updated last year
- afl-fuzz for javascript☆203Updated 8 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- Seeding fuzzers with symbolic execution☆203Updated 8 years ago
- An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such …☆31Updated 4 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago