Works about detecting vulnerable using ML.
☆87May 2, 2020Updated 5 years ago
Alternatives and similar repositories for MLDetectVuln
Users that are interested in MLDetectVuln are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆350Oct 24, 2024Updated last year
- ☆23Jul 19, 2019Updated 6 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 4 years ago
- ☆50Jan 19, 2019Updated 7 years ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Jan 27, 2017Updated 9 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 5 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- Software vulnerabilities data set☆25Mar 4, 2020Updated 6 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆70Dec 2, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- ☆12Aug 9, 2020Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆347Nov 17, 2020Updated 5 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 2 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Aug 17, 2021Updated 4 years ago
- ☆14May 23, 2023Updated 2 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Jun 21, 2021Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- Get results of binaryai.cn using our SDK☆506Feb 9, 2026Updated last month
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆275Oct 28, 2019Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆63Feb 24, 2026Updated last month
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- ☆18Aug 17, 2023Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Aug 9, 2018Updated 7 years ago
- Fuzzing SILK with AFL☆25May 29, 2020Updated 5 years ago