☆12Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for VFFinder
Users that are interested in VFFinder are comparing it to the libraries listed below
Sorting:
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆26Sep 13, 2025Updated 5 months ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆15Sep 27, 2024Updated last year
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated last month
- Recent Paper About Bug Detection☆32Sep 27, 2019Updated 6 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- A practical fuzzing tool for SMT solvers☆11Nov 26, 2025Updated 3 months ago
- FDU CS 2025 Coding Test Q&A☆19Aug 29, 2025Updated 6 months ago
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 10 months ago
- This project provides several implementations for commit untangling and proposes a new representation of git patches by projecting the pa…☆11Jul 28, 2025Updated 7 months ago
- ☆46Sep 8, 2023Updated 2 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- 四川大学抢课系统 (已整合进入Draven-System)☆14Mar 4, 2020Updated 5 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- ☆15May 22, 2023Updated 2 years ago
- ☆19Sep 7, 2025Updated 5 months ago
- ☆11Jul 8, 2024Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- ☆18Mar 18, 2024Updated last year
- scu-ctf平台上题目的Writeup☆13Oct 30, 2023Updated 2 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆67Mar 25, 2025Updated 11 months ago
- ☆15Mar 13, 2021Updated 4 years ago
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Apr 15, 2020Updated 5 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆12Jan 31, 2024Updated 2 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- List of useful mental models form Gabriel Weinberg, CEO and co-founder of Duck Duck Go☆16Jun 25, 2017Updated 8 years ago
- ☆13May 28, 2023Updated 2 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- ☆17May 5, 2022Updated 3 years ago
- ☆14May 28, 2024Updated last year
- LLM for System/Software Security☆23Dec 29, 2024Updated last year
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 8 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆18Dec 15, 2025Updated 2 months ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Jan 23, 2026Updated last month