ryohare / fortify-structural-rules-guide
A technique for developing Fortify structural rules and characterization rules.
☆14Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for fortify-structural-rules-guide
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆27Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆88Updated 6 years ago
- Personal CodeQL queries☆58Updated this week
- A benchmark to evaluate taint analysis☆30Updated 2 years ago
- ☆28Updated 4 years ago
- 基于JVM-Sandbox实现RASP安全监控防护☆51Updated last year
- CTF stuff☆40Updated last year
- ☆23Updated 5 years ago
- Fuzzing dictionaries for afl-fuzz/LibFuzzer☆88Updated 3 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆13Updated 4 years ago
- ☆129Updated 2 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆23Updated 8 months ago
- 《深入理解Semgrep》Finding vulnerabilities with Semgrep.☆38Updated last year
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- This repository has been merged into https://github.com/HXSecurity/DongTai. DongTai-engine used to analyze the method data collected by …☆20Updated 2 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆16Updated 5 years ago
- My CodeQL queries collection☆94Updated last year
- Works about detecting vulnerable using ML.☆83Updated 4 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆34Updated 4 years ago
- 物联网设备分析环境搭建与工具使用,包括脚本换阿里源、binwalk的完整安装、firmwalker和rips的使用☆41Updated 6 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆16Updated 7 months ago
- 总结了一下2019年在JVM环境中使用XXE攻击的知识☆57Updated 5 years ago
- Mobile Security Keynote☆33Updated 6 years ago
- ☆23Updated 3 years ago
- A Vulnerable Web App written by JavaScript (Vue+Egg)☆12Updated last week