☆27Feb 19, 2024Updated 2 years ago
Alternatives and similar repositories for RecurScan
Users that are interested in RecurScan are comparing it to the libraries listed below
Sorting:
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆16Apr 7, 2023Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- ☆43Jan 30, 2023Updated 3 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆76Aug 15, 2024Updated last year
- ☆61Apr 24, 2023Updated 2 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- ☆20Jan 19, 2026Updated last month
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- 针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。☆40Sep 10, 2025Updated 5 months ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- ☆19Jun 27, 2023Updated 2 years ago
- ☆206Oct 27, 2025Updated 4 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆51May 9, 2025Updated 9 months ago
- PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer☆23Dec 27, 2024Updated last year
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆26Sep 13, 2025Updated 5 months ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 6 months ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☆35Feb 4, 2026Updated last month
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- datacon比赛2024年漏洞分析赛道解题框架与运行镜像压缩包☆184Jun 10, 2025Updated 8 months ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- ☆27Jun 7, 2022Updated 3 years ago
- ☆32May 1, 2025Updated 10 months ago
- A set of Code-ql/Joern queries to find vulnerabilities☆67May 22, 2021Updated 4 years ago
- Challenge examples for GZ::CTF☆36Mar 6, 2024Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Simple WebSocket fuzzer☆32Jun 15, 2023Updated 2 years ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Oct 29, 2024Updated last year
- A manually vetted dataset for security vulnerability detection in Java projects☆92Aug 12, 2025Updated 6 months ago
- GitHub Cloner & Compiler☆76Sep 24, 2021Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago