zifeng-kang / ProbetheProto
☆28Updated 2 years ago
Alternatives and similar repositories for ProbetheProto:
Users that are interested in ProbetheProto are comparing it to the libraries listed below
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆95Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆167Updated 6 months ago
- ☆38Updated 2 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆23Updated 3 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆65Updated 7 months ago
- Witcher is the first framework for using AFL to fuzz web applications.☆84Updated last year
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆56Updated 2 months ago
- A set of Code-ql/Joern queries to find vulnerabilities☆57Updated 3 years ago
- Artifact for ICSE 2023☆48Updated 2 years ago
- ☆27Updated last year
- ☆25Updated last year
- ☆19Updated 8 months ago
- ☆24Updated 2 years ago
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆153Updated last year
- ☆13Updated 5 years ago
- ☆46Updated last year
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- Grammar-based HTTP/2 fuzzer with mutation ability☆43Updated 2 years ago
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 5 months ago
- ☆10Updated last year
- AutoSpear☆60Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆12Updated 3 months ago
- A grey-box web application Fuzzer☆23Updated 7 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 6 months ago
- ☆21Updated 2 years ago
- ☆66Updated 3 years ago
- Challenge attachments for RWCTF 3rd.☆92Updated 3 years ago
- ☆65Updated 3 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆39Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆74Updated last year