A benchmark for Java gadget chain detecting algorithms.
☆15Jun 20, 2025Updated 8 months ago
Alternatives and similar repositories for Gleipner
Users that are interested in Gleipner are comparing it to the libraries listed below
Sorting:
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆16Apr 7, 2023Updated 2 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- ☆23Apr 6, 2019Updated 6 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- COVA - A static analysis tool to compute path conditions☆40Jul 12, 2025Updated 7 months ago
- ☆206Oct 27, 2025Updated 4 months ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- The source code of [Sec'25] Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents☆53Sep 9, 2025Updated 5 months ago
- ☆18Nov 6, 2024Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 5 months ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 5 months ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆44Feb 20, 2026Updated last week
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- ☆14Feb 4, 2020Updated 6 years ago
- The Z3-Noodler String Solver☆25Feb 21, 2026Updated last week
- The repo of "BugLens"☆35Nov 12, 2025Updated 3 months ago
- An SMT Solver for string constraints☆48Feb 10, 2026Updated 2 weeks ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- ☆29Updated this week
- ☆22Jul 3, 2022Updated 3 years ago
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆22Jan 23, 2025Updated last year
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆45Feb 21, 2026Updated last week
- ☆42Jan 30, 2023Updated 3 years ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Jul 17, 2025Updated 7 months ago
- ☆21Apr 30, 2021Updated 4 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆27Jan 27, 2025Updated last year
- YASA is an open-source static program analysis project. Its core innovation lies in a unified intermediate representation called UAST, d…☆249Updated this week
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- ☆30Aug 30, 2022Updated 3 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated last year
- ☆31May 1, 2025Updated 9 months ago