This repository contains materials related to our DeepSQLi paper published in ISSTA 2020.
☆21Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for issta2020
Users that are interested in issta2020 are comparing it to the libraries listed below
Sorting:
- ☆11Apr 22, 2020Updated 5 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- log4j2 rce漏洞扫描器☆11Mar 2, 2024Updated 2 years ago
- 基于Pytorch卷积神经网络实现蒸汽波复古风格滤镜☆10Nov 17, 2020Updated 5 years ago
- Use mason's rule to simplify signal flow graphs in MATLAB☆11Mar 5, 2020Updated 6 years ago
- Faster access to Tesseract-OCR from Python☆13Jun 8, 2021Updated 4 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- Locality Preserving Dense Graph Convolutional Networks with Graph Context-Aware Node Representations☆11Jan 21, 2021Updated 5 years ago
- Machine Learning WAF Based☆96Nov 3, 2020Updated 5 years ago
- Small extensions of the Bellman-Ford routines in NetworkX, primarily for convenience☆13May 7, 2018Updated 7 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- a script to help with running qemu☆12May 19, 2024Updated last year
- 三轮转轮密码机加密及解密程序☆11Feb 19, 2018Updated 8 years ago
- ☆11Jun 27, 2022Updated 3 years ago
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- ☆10Mar 5, 2016Updated 10 years ago
- 外网信息收集-思维导图☆17Jul 17, 2023Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆13Jan 21, 2019Updated 7 years ago
- ☆11Oct 10, 2018Updated 7 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 5 years ago
- Personal curation of Clang/LLVM patches.☆12Feb 27, 2021Updated 5 years ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- 反洗钱使用黑名单数据爬取☆13Jul 7, 2015Updated 10 years ago
- Simple ClamAV win32 UI☆20Mar 14, 2025Updated 11 months ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- A reverse proxy for authenticating access to a K8s API hosted on EKS with a third party login.☆15Apr 3, 2023Updated 2 years ago
- Microsoft Windows real time file integrity monitoring and filtering using minifilter technology, this is was my university final project☆11Oct 17, 2014Updated 11 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- 你也可以做个Shadowsocks(Android篇)☆14Jan 30, 2022Updated 4 years ago
- Adds bed leveling buttons to the controls tab on OctoPrint☆13Aug 17, 2025Updated 6 months ago
- WAF Environment for OpenAI Gym☆14Dec 13, 2020Updated 5 years ago
- a21 — Arduino bits☆11Apr 12, 2021Updated 4 years ago
- Correlation Power Analysis☆13Aug 3, 2018Updated 7 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago