☆17Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for TEFuzz
Users that are interested in TEFuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆43Jan 30, 2023Updated 3 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 7 months ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 10 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- csie.ctf.tw☆15Jan 13, 2017Updated 9 years ago
- 基于Netfilter的轻量级防火墙,能够实现IP,端口和协议的五元组过滤。其中协议支持TCP,UDP和ICMP,支持掩码,能够设置配置文件并启动读取,能过添加日志。☆11Sep 30, 2017Updated 8 years ago
- ☆206Oct 27, 2025Updated 5 months ago
- ☆15Oct 31, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Tango: Extracting Higher-Order Feedback through State Inference☆17Aug 8, 2024Updated last year
- A vul-finder for loading CPG and automated finding vul-call-chains☆72Jul 22, 2025Updated 8 months ago
- ☆33May 27, 2024Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- The source code of [CCS'25] BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications☆32Mar 16, 2026Updated last week
- ☆13Jan 31, 2024Updated 2 years ago
- ☆22Sep 28, 2022Updated 3 years ago
- ☆17Jul 11, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 吴恩达《机器学习》编程作业Python实现☆11Aug 9, 2020Updated 5 years ago
- ☆18Nov 6, 2024Updated last year
- Research on cybersecurity data usage in research papers☆15Dec 15, 2017Updated 8 years ago
- ☆61Apr 24, 2023Updated 2 years ago
- Yan, Ruibin, Yijun Gu, Zeyu Zhang, and Shouzhong Jiao. 2023. "Vehicle Trajectory Prediction Method for Task Offloading in Vehicular Edge …☆14Sep 27, 2023Updated 2 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆45Feb 20, 2026Updated last month
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- peda like debugger script for windbg/windbgx and mingw-gdb☆11Dec 31, 2021Updated 4 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Dec 7, 2023Updated 2 years ago
- ☆49Oct 27, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- ☆11Sep 7, 2023Updated 2 years ago
- ☆11Apr 10, 2018Updated 7 years ago
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago