xywang18 / RengarLinks
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
☆13Updated last month
Alternatives and similar repositories for Rengar
Users that are interested in Rengar are comparing it to the libraries listed below
Sorting:
- ☆14Updated 5 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆12Updated 9 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆70Updated 10 months ago
- ☆21Updated 3 years ago
- An automated ROP generation work☆11Updated 4 months ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆12Updated 8 months ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆34Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆176Updated 9 months ago
- ☆26Updated last year
- A structure-aware grey box fuzzer based on modeling the input processing logic.☆169Updated 9 months ago
- Witcher is the first framework for using AFL to fuzz web applications.☆91Updated last year
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- attachments and (some) writeups/source code for RWCTF 6th☆113Updated last year
- 存储iot设备分析工具和分析文件☆14Updated 4 years ago
- ☆27Updated 2 years ago
- IDA Hexrays To Joern☆40Updated 8 months ago
- An automated static taint analysis tool for the Lua web framework.☆20Updated 9 months ago
- ☆39Updated 2 years ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆85Updated 5 months ago
- Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆63Updated this week
- ☆37Updated last month
- Some test samples for CPG execution logic.☆20Updated last year
- ☆29Updated 2 years ago
- ☆16Updated 2 years ago
- ☆64Updated 3 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆63Updated 4 years ago
- Archive of AAA CTF 2022 (XCTF competition)☆78Updated 8 months ago
- Code audit (code review) with VIM.☆16Updated 6 months ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆76Updated last year
- Automatic Exploit Generation Paper☆90Updated 3 years ago