Security papers about software vulnerabilities and exploits
☆14Jan 16, 2019Updated 7 years ago
Alternatives and similar repositories for Security-Papers
Users that are interested in Security-Papers are comparing it to the libraries listed below
Sorting:
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.☆43Feb 16, 2026Updated 2 weeks ago
- ☆20Jun 7, 2025Updated 8 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Mar 15, 2020Updated 5 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- ☆26Feb 9, 2023Updated 3 years ago
- cinspector - a static C source code analysis framework☆29Jun 20, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- A group of students who are interested in Compilers, and they want to improve themselves together.☆25Aug 23, 2022Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- SCTBench: a set of C/C++ pthread benchmarks for evaluating concurrency testing techniques.☆33Dec 16, 2021Updated 4 years ago
- angr源码分析☆33Jan 6, 2020Updated 6 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- A Micro-benchmarking Framework for Python Type Inference Tools☆38Nov 13, 2025Updated 3 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Repository for ASE 2017 paper, "Modular Verification of Interrupt-driven Software".☆11May 20, 2019Updated 6 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 3 weeks ago
- ☆12Feb 10, 2026Updated 3 weeks ago
- COVA - A static analysis tool to compute path conditions☆40Updated this week
- ☆11Sep 6, 2024Updated last year
- ☆41Feb 25, 2019Updated 7 years ago
- ☆39May 11, 2023Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- A blog of Programming Languages Group @Purdue☆11Feb 17, 2026Updated 2 weeks ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 3 months ago