weidutech / CCS_GuideLinks
A simple guide for CCS student
☆9Updated 3 years ago
Alternatives and similar repositories for CCS_Guide
Users that are interested in CCS_Guide are comparing it to the libraries listed below
Sorting:
- ☆39Updated 2 years ago
- Awesome Large Language Models for Vulnerability Detection☆192Updated this week
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆313Updated 7 months ago
- ☆26Updated last year
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆53Updated 3 years ago
- ☆45Updated last year
- FirmSec Dataset☆10Updated 3 years ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆86Updated 5 months ago
- Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing…☆359Updated 6 months ago
- A structure-aware grey box fuzzer based on modeling the input processing logic.☆169Updated 9 months ago
- ☆23Updated 3 years ago
- the rhg robot for ichunqiu 2018☆21Updated 6 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆70Updated 11 months ago
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆110Updated 4 years ago
- Some IOT Integration of Technical Articles☆193Updated 2 years ago
- oh my soot !☆91Updated 2 years ago
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆185Updated 2 years ago
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆274Updated 5 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆66Updated this week
- Automatic use of House of Some & House of Illusion.☆66Updated last month
- ☆29Updated 2 years ago
- A repository-level AI-generated code security evaluation benchmark☆90Updated this week
- ☆18Updated 2 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆176Updated 9 months ago
- ☆98Updated last year
- An automated ROP generation work☆11Updated 4 months ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆77Updated 3 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- Automatically exported from code.google.com/p/alpha3☆56Updated 5 years ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago