COVA - A static analysis tool to compute path conditions
☆40Mar 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for COVA
Users that are interested in COVA are comparing it to the libraries listed below
Sorting:
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆11Oct 10, 2018Updated 7 years ago
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 6 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆69Jun 7, 2019Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- A Static Dataflow Analysis Framework for iOS Applications.☆51Mar 27, 2024Updated last year
- ☆41Mar 10, 2021Updated 5 years ago
- ☆17Dec 30, 2023Updated 2 years ago
- ☆23Apr 6, 2019Updated 6 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- An implementation of sparse-value flow analysis on top of soot (using Scala)☆10Dec 12, 2024Updated last year
- fuzzing + concolic = fuzzolic :)☆129Nov 6, 2025Updated 4 months ago
- A Static Code Feature Extraction Tool for Java and Android☆21Jun 7, 2023Updated 2 years ago
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43May 19, 2020Updated 5 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- The repo of "BugLens"☆39Nov 12, 2025Updated 4 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆45Feb 20, 2026Updated last month
- ☆14Jun 21, 2020Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- This repository contains all CrySL rules currently used in the crypto assistant CogniCrypt.☆16Dec 15, 2025Updated 3 months ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- ☆16Jan 23, 2022Updated 4 years ago
- IFDS/IDE Solver for Soot and other frameworks☆255Feb 13, 2026Updated last month
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 7 months ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago