xywang18 / ctf-pwn-writeupView external linksLinks
☆14Feb 4, 2020Updated 6 years ago
Alternatives and similar repositories for ctf-pwn-writeup
Users that are interested in ctf-pwn-writeup are comparing it to the libraries listed below
Sorting:
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 6 months ago
- ☆22Jul 3, 2022Updated 3 years ago
- ☆25Apr 14, 2025Updated 10 months ago
- ☆21Apr 30, 2021Updated 4 years ago
- IDA Hexrays To Joern☆44Nov 7, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 7 months ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆20Sep 1, 2025Updated 5 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- The Z3-Noodler String Solver☆25Updated this week
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 3 months ago
- The repo of "BugLens"☆35Nov 12, 2025Updated 3 months ago
- ☆23Apr 6, 2019Updated 6 years ago
- [ICLR 2025] Official implementation for "StringLLM: Understanding the String Processing Capability of Large Language Models"☆21Jan 23, 2025Updated last year
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆21Jul 17, 2025Updated 6 months ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 5 months ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆27Jan 27, 2025Updated last year
- a repo for weekly☆69Apr 20, 2019Updated 6 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆26Feb 14, 2024Updated 2 years ago
- 一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务,下个版本将会大更新。☆100Jan 30, 2026Updated 2 weeks ago
- DC28CTF challenge parallel-af. Dataflow machine.☆59Aug 10, 2020Updated 5 years ago
- ☆31May 1, 2025Updated 9 months ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- Testability Pattern Catalogs for SAST☆32Feb 18, 2025Updated 11 months ago
- Automated black-box REST API testing using graph-based modeling, LLMs, and multi-agent reinforcement learning.☆43Dec 31, 2025Updated last month
- The source code of project "LLift" (Enhancing static analysis with LLM)☆85Mar 5, 2024Updated last year
- 极简 Hugo 博客主题 polk-x☆29Feb 1, 2026Updated 2 weeks ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆95Apr 21, 2024Updated last year
- COVA - A static analysis tool to compute path conditions☆40Jul 12, 2025Updated 7 months ago
- Collect paper metadata and abstract.☆16Feb 1, 2026Updated 2 weeks ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 4 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 2 years ago
- An SMT Solver for string constraints☆48Updated this week
- Some Vulnerability in the some protocol are collected.☆109May 29, 2024Updated last year
- ☆16Aug 19, 2024Updated last year