heaphopper
Heap vulnerability detector
A bounded model checking framework for detecting security vulnerabilities in heap implementations.
HeapHopper is a bounded model checking framework for Heap-implementations
212 stars
13 watching
18 forks
Language: Python
last commit: 5 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| An instrument used to hunt and identify cross-site scripting (XSS) vulnerabilities by tracking correlated requests and payloads. | 250 |
| A tool to detect and analyze web application vulnerabilities by monitoring suspicious traffic and storing logs in Google BigQuery for analysis | 26 |
| Develops and evaluates a framework for detecting attacks on federated learning systems | 11 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| An extension for Burp Suite to detect and analyze reflected XSS vulnerabilities in web applications. | 1,138 |
| A tool to help users find deprecated Kubernetes API versions in their code and Helm releases. | 2,155 |
| A static analysis tool for identifying security vulnerabilities in Android and Java applications. | 1,102 |
| Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |
| A collection of passive scanner checks to identify security vulnerabilities in web applications | 27 |
| Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. | 580 |
| A tool for identifying potential vulnerabilities in websites by fetching known URLs and filtering out ones with open redirects or SSRF parameters. | 168 |
| An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach | 643 |
| Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
| Automated vulnerability detection tool for web applications | 235 |
| Analyzes firmware vulnerabilities using concolic analysis and function clustering | 472 |