COVA - A static analysis tool to compute path conditions
☆40Mar 2, 2026Updated last month
Alternatives and similar repositories for COVA
Users that are interested in COVA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆11Oct 10, 2018Updated 7 years ago
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 7 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆72Jun 7, 2019Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- A Static Dataflow Analysis Framework for iOS Applications.☆52Mar 27, 2024Updated 2 years ago
- ☆41Mar 10, 2021Updated 5 years ago
- ☆17Dec 30, 2023Updated 2 years ago
- ☆23Apr 6, 2019Updated 7 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- An implementation of sparse-value flow analysis on top of soot (using Scala)☆10Dec 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- fuzzing + concolic = fuzzolic :)☆129Nov 6, 2025Updated 5 months ago
- A Static Code Feature Extraction Tool for Java and Android☆21Jun 7, 2023Updated 2 years ago
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43May 19, 2020Updated 5 years ago
- ☆19Feb 1, 2016Updated 10 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- The repo of "BugLens"☆39Nov 12, 2025Updated 4 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 5 months ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆45Feb 20, 2026Updated last month
- ☆14Jun 21, 2020Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42May 7, 2023Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository contains all CrySL rules currently used in the crypto assistant CogniCrypt.☆16Apr 2, 2026Updated last week
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Oct 24, 2017Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆20Sep 1, 2025Updated 7 months ago
- ☆16Jan 23, 2022Updated 4 years ago
- IFDS/IDE Solver for Soot and other frameworks☆255Mar 19, 2026Updated 3 weeks ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago