Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
☆15Jul 24, 2025Updated 9 months ago
Alternatives and similar repositories for Rengar
Users that are interested in Rengar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 4, 2020Updated 6 years ago
- ☆23Jul 3, 2022Updated 3 years ago
- IDA Hexrays To Joern☆46Nov 7, 2024Updated last year
- ☆21Apr 30, 2021Updated 5 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆11May 18, 2021Updated 4 years ago
- A benchmark for Java gadget chain detecting algorithms.☆16Jun 20, 2025Updated 10 months ago
- ☆20Jan 19, 2026Updated 3 months ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 8 months ago
- ☆23Apr 6, 2019Updated 7 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆16Oct 3, 2024Updated last year
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 8 months ago
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Playground for Race Condition attack☆24Mar 18, 2023Updated 3 years ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- SQLmap tamper scripts☆18Feb 14, 2024Updated 2 years ago
- The Z3-Noodler String Solver☆25Apr 24, 2026Updated last week
- A simple Joern MCP Server.☆39Apr 17, 2026Updated 2 weeks ago
- ☆25Apr 14, 2025Updated last year
- The source code of project "LLift" (Enhancing static analysis with LLM)☆87Mar 5, 2024Updated 2 years ago
- Paper_Copilot 是一款基于向量索引和大模型的高级文献分析命令行工具,旨在帮助学术研究人员高效管理、检索和分析海量文献。通过本地自建知识库并与大模型的交互,它能够为用户提供专业且精准的解答,显著提升文献研究的效率与准确性。☆25Oct 15, 2024Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The repo of "BugLens"☆40Nov 12, 2025Updated 5 months ago
- Parsing-based Analyzer☆75Jun 8, 2025Updated 10 months ago
- A library for finite automata and regular expressions in the context of JS RegExp☆30Jun 16, 2024Updated last year
- ☆29Apr 14, 2026Updated 3 weeks ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆100Apr 21, 2024Updated 2 years ago
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Apr 9, 2026Updated 3 weeks ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆87Apr 23, 2026Updated last week
- Collection of CTF Web challenges I made☆28Feb 21, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27Feb 19, 2024Updated 2 years ago
- Automatically generates schema given json samples.☆10Jun 1, 2016Updated 9 years ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆29Jan 27, 2025Updated last year
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- MutRex - A generator of fault detecting strings for regular expressions☆13Mar 18, 2024Updated 2 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 9 months ago
- The source code of [Sec'25] Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents☆77Apr 13, 2026Updated 3 weeks ago