A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
-
Updated
Oct 12, 2022 - C
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programming language the necessary steps required to prevent such errors in product development.
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
network vulnerability-test engine nasl like script engine
PHP Open Iast Agent
CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dynamic program execution traces.
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A github action to perform C/C++ security checks automatically
SMB module for OpenVAS Scanner
This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.
Greenbone Vulnerability Management Libraries
This repository contains the scanner component for Greenbone Community Edition.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Add a description, image, and links to the vulnerability-detection topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-detection topic, visit your repo's landing page and select "manage topics."