Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)
☆16Oct 3, 2024Updated last year
Alternatives and similar repositories for symphp
Users that are interested in symphp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆16Jun 20, 2025Updated 11 months ago
- ☆18Apr 7, 2023Updated 3 years ago
- ☆45Jan 30, 2023Updated 3 years ago
- ☆11Apr 21, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Nov 6, 2024Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Aug 15, 2024Updated last year
- ☆15Mar 19, 2022Updated 4 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆105Nov 28, 2023Updated 2 years ago
- The source code of [Sec'25] Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents☆81Apr 13, 2026Updated last month
- Artifact for ICSE 2023☆52Sep 24, 2022Updated 3 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Mar 20, 2026Updated last month
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆18Dec 19, 2025Updated 5 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 9 months ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 8 months ago
- ☆23Apr 6, 2019Updated 7 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 9 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 6 months ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- The Z3-Noodler String Solver☆26May 7, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆46Feb 20, 2026Updated 3 months ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 8 months ago
- The repo of "BugLens"☆41Nov 12, 2025Updated 6 months ago
- ☆14Feb 4, 2020Updated 6 years ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated 2 years ago
- ☆161Jun 3, 2024Updated last year
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated 2 years ago
- ☆29Aug 30, 2022Updated 3 years ago
- ☆29May 12, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆62Apr 24, 2023Updated 3 years ago
- BrowserAgent: Building Web Agents with Human-Inspired Web Browsing Actions [TMLR2025]☆32Jan 13, 2026Updated 4 months ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Apr 9, 2026Updated last month
- LLM-powered tool that enhances OpenAPI specifications by extracting machine-readable constraints from human-readable descriptions.☆14Nov 6, 2024Updated last year
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆22Jan 23, 2025Updated last year
- YASA is an open-source static program analysis project. Its core innovation lies in a unified intermediate representation called UAST, d…☆272May 7, 2026Updated last week
- This is an unofficial read-only mirror of the gem5 simulator. The upstream repository is stored in Mercurial at http://repo.gem5.org/gem5…☆13May 2, 2020Updated 6 years ago