A benchmark for Java gadget chain detecting algorithms.
☆15Jun 20, 2025Updated 9 months ago
Alternatives and similar repositories for Gleipner
Users that are interested in Gleipner are comparing it to the libraries listed below
Sorting:
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- Artifact for ICSE 2023☆50Sep 24, 2022Updated 3 years ago
- ☆17Apr 7, 2023Updated 2 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- ☆206Oct 27, 2025Updated 4 months ago
- COVA - A static analysis tool to compute path conditions☆40Mar 2, 2026Updated 2 weeks ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- ☆23Apr 6, 2019Updated 6 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 7 months ago
- ☆23Jul 3, 2022Updated 3 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- ☆18Nov 6, 2024Updated last year
- An SMT Solver for string constraints☆49Feb 10, 2026Updated last month
- The Z3-Noodler String Solver☆25Mar 12, 2026Updated last week
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆45Feb 20, 2026Updated last month
- Image classification done with Mindspore technology☆12Jan 24, 2021Updated 5 years ago
- A vul-finder for loading CPG and automated finding vul-call-chains☆72Jul 22, 2025Updated 7 months ago
- ☆14Feb 4, 2020Updated 6 years ago
- The repo of "BugLens"☆39Nov 12, 2025Updated 4 months ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- ☆30Updated this week
- Replication package of the ICSE2025 paper titled "Leveraging Large Language Models for Enhancing the Understandability of Generated Unit …☆11Feb 19, 2025Updated last year
- ☆21Apr 30, 2021Updated 4 years ago
- The source code of [Sec'25] Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents☆60Sep 9, 2025Updated 6 months ago
- ☆30Aug 30, 2022Updated 3 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆33Aug 8, 2024Updated last year
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Jul 17, 2025Updated 8 months ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆27Jan 27, 2025Updated last year
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆22Jan 23, 2025Updated last year
- ☆43Jan 30, 2023Updated 3 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆53Updated this week