An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning".
☆75Oct 29, 2025Updated 4 months ago
Alternatives and similar repositories for VulLLM
Users that are interested in VulLLM are comparing it to the libraries listed below
Sorting:
- Investigating Large Language Models for Code Vulnerability Detection: An Experimental Study☆40Mar 20, 2025Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆115Dec 4, 2025Updated 3 months ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆96Apr 21, 2024Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- ☆54Nov 19, 2022Updated 3 years ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- Repository for PrimeVul Vulnerability Detection Dataset☆226Sep 7, 2024Updated last year
- ☆18Mar 18, 2024Updated 2 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆176Oct 23, 2024Updated last year
- ☆13May 28, 2023Updated 2 years ago
- ☆225Jul 25, 2024Updated last year
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆357Mar 25, 2021Updated 4 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆139Jan 12, 2025Updated last year
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆33Mar 6, 2026Updated 2 weeks ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Data and code for "Chain-of-Thought in Neural Code Generation: From and For Lightweight Language Models", which accepted in TSE.☆15Jul 3, 2024Updated last year
- Awesome Large Language Models for Vulnerability Detection☆398Updated this week
- ☆47Mar 7, 2025Updated last year
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- ☆13Oct 11, 2024Updated last year
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 9 months ago
- [ICSE'24 Industry Challenge Track] "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆93Nov 24, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- ☆128Jul 14, 2024Updated last year
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆64May 4, 2025Updated 10 months ago
- ☆15May 22, 2023Updated 2 years ago
- SecVulEval is a dataset of C/C++ vulnerabilities.☆18Dec 20, 2025Updated 3 months ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆34Mar 11, 2025Updated last year
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 4 months ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- ☆27Sep 15, 2024Updated last year
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆256Jan 19, 2024Updated 2 years ago