☆27Feb 19, 2024Updated 2 years ago
Alternatives and similar repositories for RecurScan
Users that are interested in RecurScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆17Apr 7, 2023Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- ☆61Apr 24, 2023Updated 2 years ago
- ☆43Jan 30, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- 针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。☆41Sep 10, 2025Updated 6 months ago
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- ☆20Jan 19, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- ☆20Jun 27, 2023Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- ☆206Oct 27, 2025Updated 5 months ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- ☆16Mar 13, 2024Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Oct 14, 2025Updated 5 months ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆14May 28, 2024Updated last year
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- ☆13Updated this week
- weblogic漏洞利用工具☆17Jul 16, 2020Updated 5 years ago
- ☆11Jul 8, 2024Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Memory check for C/C++.☆12Sep 7, 2017Updated 8 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆341Dec 12, 2024Updated last year
- ☆22Aug 30, 2025Updated 6 months ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago