secure-software-engineering / SootFXLinks
A Static Code Feature Extraction Tool for Java and Android
☆20Updated 2 years ago
Alternatives and similar repositories for SootFX
Users that are interested in SootFX are comparing it to the libraries listed below
Sorting:
- COVA - A static analysis tool to compute path conditions☆37Updated 2 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Updated 8 months ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆75Updated 11 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆78Updated last year
- ☆66Updated 4 years ago
- ☆25Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 9 months ago
- z3 solver 学习☆52Updated 2 years ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆143Updated last week
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆37Updated 10 months ago
- ☆25Updated last year
- A Static Dataflow Analysis Framework for iOS Applications.☆47Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- A Coverage-Based fuzzing tools☆23Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- IDA Hexrays To Joern☆41Updated 11 months ago
- ☆23Updated 3 years ago
- A collection of POP exploits.☆30Updated 4 years ago
- angr源码分析☆33Updated 5 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆64Updated 4 years ago
- ☆27Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- This is the project of LearnAFL.☆28Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆14Updated 3 years ago
- ☆41Updated last year
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆90Updated 7 years ago