Software vulnerabilities data set
☆25Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for VulinOSS
Users that are interested in VulinOSS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A vulnerability patch gathering tool☆44Jan 11, 2019Updated 7 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆30Jul 25, 2019Updated 6 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 2 months ago
- ☆23Jul 19, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- source{d} extension to match Git signatures to real people.☆17Nov 12, 2019Updated 6 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Home page of project "KB"☆134Mar 27, 2025Updated last year
- ☆18Sep 7, 2025Updated 7 months ago
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆18Dec 15, 2020Updated 5 years ago
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- ☆15Aug 5, 2020Updated 5 years ago
- [Deprecated] Source Code Generation using Sequence Generative Adversarial Networks☆75Jan 7, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Material (mostly slides) for a graduate course on (formal) software analysis.☆33Jul 15, 2019Updated 6 years ago
- A graph coloring register allocator for LLVM.☆11Jan 23, 2017Updated 9 years ago
- sourced.ml is a library and command line tools to build and apply machine learning models on top of Universal Abstract Syntax Trees☆141May 22, 2019Updated 6 years ago
- ☆11Jul 2, 2025Updated 9 months ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Home page for this github organization☆22Aug 10, 2018Updated 7 years ago
- ☆14Mar 9, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- CPR: A new automated program repair technique based on concolic execution which works on patch abstraction with the sub-optimal goal of r…☆33Oct 23, 2022Updated 3 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- ☆20Sep 25, 2017Updated 8 years ago
- Various sketches for pen plotters, and my notes related to pen plotters.☆17Nov 19, 2025Updated 4 months ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- ☆16Dec 29, 2023Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆74May 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Jun 15, 2023Updated 2 years ago
- Stepping VLMs onto the Court: Benchmarking Spatial Intelligence in Sports☆67Mar 15, 2026Updated last month
- A Java version of the automatic program repair described by RSRepair and GenProg.☆11Jan 6, 2016Updated 10 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆349Nov 17, 2020Updated 5 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago