seclab-fudan / RecurScanLinks
☆26Updated last year
Alternatives and similar repositories for RecurScan
Users that are interested in RecurScan are comparing it to the libraries listed below
Sorting:
- ☆38Updated 2 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆68Updated 9 months ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 6 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆75Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆171Updated 8 months ago
- Some test samples for CPG execution logic.☆21Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 8 months ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆13Updated 7 months ago
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆20Updated 3 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆13Updated last week
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- ☆25Updated 2 years ago
- ☆16Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- 一个搜索网络安全领域顶会论文的小工具☆86Updated 7 months ago
- FirmSec Dataset☆10Updated 3 years ago
- ☆22Updated 3 years ago
- ☆25Updated 2 years ago
- ☆16Updated 10 months ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆76Updated 3 months ago
- Artifact for ICSE 2023☆49Updated 2 years ago
- ☆21Updated 2 years ago
- Works about detecting vulnerable using ML.☆83Updated 5 years ago
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- ☆129Updated 3 weeks ago
- ☆17Updated last year
- A manually vetted dataset for security vulnerability detection in Java projects☆53Updated last month
- A benchmark to evaluate taint analysis☆30Updated 2 years ago
- 存储iot设备分析工具和分析文件☆14Updated 4 years ago
- Automatic Exploit Generation Paper☆88Updated 3 years ago