This repository contains materials related to our DeepSQLi paper published in ISSTA 2020.
☆21Apr 11, 2021Updated 5 years ago
Alternatives and similar repositories for issta2020
Users that are interested in issta2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modelling SQL Injection Using Reinforcement Learning☆20Oct 13, 2021Updated 4 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Oct 28, 2018Updated 7 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆201Mar 6, 2024Updated 2 years ago
- Provenance: Linking and Understanding Sources☆17May 24, 2024Updated last year
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆26Jan 23, 2024Updated 2 years ago
- Flexible blockchain framework for Java development☆13Apr 16, 2018Updated 8 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- Kubernetes Aggregated API Server to track lineage/provenance of Kubernetes Custom resources☆25Jan 1, 2019Updated 7 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- 分布式资产安全扫描核心管理系统Web页面(弱口令扫描,漏洞扫描)☆28Apr 9, 2020Updated 6 years ago
- ☆14Mar 24, 2013Updated 13 years ago
- ☆25Jan 24, 2022Updated 4 years ago
- Detect Sql Injection by Machine Learning☆18Jan 8, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Machine Learning WAF Based☆96Nov 3, 2020Updated 5 years ago
- Scratchpad/Chain-of-Thought Prompts☆12Jun 6, 2022Updated 3 years ago
- NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间☆22Mar 27, 2026Updated last month
- Spring Boot Source Weaving Example with AspectJ☆15May 17, 2018Updated 7 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- blender scripts for shapenet☆11Oct 12, 2020Updated 5 years ago
- The original PyTorch implementation of the "EXACT: How Train Your Accuracy"☆10Sep 22, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Apr 28, 2020Updated 6 years ago
- Pydata MAB Tutorial☆10Jul 6, 2018Updated 7 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- Practical ideas on securing machine learning models☆37May 27, 2021Updated 4 years ago
- Small extensions of the Bellman-Ford routines in NetworkX, primarily for convenience☆13May 7, 2018Updated 8 years ago
- Material for tutorial "Hybrid techniques for knowledge-based NLP: Knowledge graphs meet machine learning and all their friends" at KCAP…☆16Dec 4, 2017Updated 8 years ago
- ☆30Oct 30, 2020Updated 5 years ago
- Awvs批量扫描脚本,Awvs13批量扫描脚本(对低配置机器进行优化,避免跑死),对Scan进行控制☆10Dec 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- Locality Preserving Dense Graph Convolutional Networks with Graph Context-Aware Node Representations☆11Jan 21, 2021Updated 5 years ago
- ☆11Apr 22, 2020Updated 6 years ago
- ☆11Oct 10, 2018Updated 7 years ago
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- easy_Pwn☆19Apr 19, 2019Updated 7 years ago