xywang18 / RengarLinks
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
☆13Updated last month
Alternatives and similar repositories for Rengar
Users that are interested in Rengar are comparing it to the libraries listed below
Sorting:
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆12Updated 10 months ago
- ☆14Updated 5 years ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆16Updated 9 months ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆71Updated last year
- An automated ROP generation work☆11Updated 5 months ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆178Updated 11 months ago
- ☆27Updated last year
- ☆21Updated 3 years ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆34Updated last year
- Witcher is the first framework for using AFL to fuzz web applications.☆92Updated last year
- ☆28Updated 2 years ago
- An automated static taint analysis tool for the Lua web framework.☆20Updated 10 months ago
- ☆40Updated 2 years ago
- IDA Hexrays To Joern☆41Updated 9 months ago
- 存储iot设备分析工具和分析文件☆14Updated 4 years ago
- ☆15Updated 2 years ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆104Updated 6 months ago
- attachments and (some) writeups/source code for RWCTF 6th☆115Updated last year
- A set of Code-ql/Joern queries to find vulnerabilities☆64Updated 4 years ago
- Code audit (code review) with VIM.☆16Updated 7 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆68Updated last month
- A structure-aware grey box fuzzer based on modeling the input processing logic.☆171Updated 10 months ago
- Some test samples for CPG execution logic.☆20Updated last year
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆60Updated 4 months ago
- ☆10Updated last year
- ☆29Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆77Updated last year
- ☆17Updated last month
- Taint analysis implementation based on Heros and Soot☆45Updated last year