seclab-fudan / TEFuzzView external linksLinks
☆16Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for TEFuzz
Users that are interested in TEFuzz are comparing it to the libraries listed below
Sorting:
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 7 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- ☆27Feb 19, 2024Updated last year
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆42Jan 30, 2023Updated 3 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 5 months ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆30Aug 18, 2025Updated 5 months ago
- ☆61Apr 24, 2023Updated 2 years ago
- ☆206Oct 27, 2025Updated 3 months ago
- ☆32May 27, 2024Updated last year
- A vul-finder for loading CPG and automated finding vul-call-chains☆71Jul 22, 2025Updated 6 months ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 8 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆44Dec 31, 2025Updated last month
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 3 months ago
- To solve some readflag situation in ctfs☆33Jan 12, 2021Updated 5 years ago
- ☆161Jun 3, 2024Updated last year
- ☆32Jul 1, 2021Updated 4 years ago
- Dynamic causal Bayesian optimisation☆40Apr 24, 2023Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- ☆10Sep 6, 2024Updated last year
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆138Apr 7, 2025Updated 10 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- 123123☆16Dec 31, 2025Updated last month
- 《Web安全教程之XXE漏洞》XML External Entity Injection.☆11Nov 1, 2025Updated 3 months ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- Privacy Check Go☆22Nov 20, 2025Updated 2 months ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- The companion code to the paper "Model-based Causal Bayesian Optimization"☆11Nov 16, 2022Updated 3 years ago
- ☆10Oct 7, 2017Updated 8 years ago