This repository contains materials related to our DeepSQLi paper published in ISSTA 2020.
☆21Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for issta2020
Users that are interested in issta2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modelling SQL Injection Using Reinforcement Learning☆20Oct 13, 2021Updated 4 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Oct 28, 2018Updated 7 years ago
- Example showing the usage of AspectJ Load-Time Weawing.☆10Aug 28, 2022Updated 3 years ago
- Concurrent-C to Rust Automatic Translator☆15Jan 26, 2023Updated 3 years ago
- Provenance collection and visualization tool based on W3C PROV standard☆14Jan 21, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Flexible blockchain framework for Java development☆13Apr 16, 2018Updated 7 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- Kubernetes Aggregated API Server to track lineage/provenance of Kubernetes Custom resources☆25Jan 1, 2019Updated 7 years ago
- 这是我做的毕业设计《基于物联网的自助停车系统》的单片机程序,采用stm32,该部分程序是停车位终端的控制程序。☆10Jan 6, 2017Updated 9 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- 分布式资产安全扫描核心管理系统Web页面(弱口令扫描,漏洞扫描)☆28Apr 9, 2020Updated 5 years ago
- ☆14Mar 24, 2013Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Detect Sql Injection by Machine Learning☆18Jan 8, 2020Updated 6 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- Spring Boot Source Weaving Example with AspectJ☆15May 17, 2018Updated 7 years ago
- PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)☆13Jan 29, 2024Updated 2 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- blender scripts for shapenet☆11Oct 12, 2020Updated 5 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated 2 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Vulnerable Web App written by JavaScript (Vue+Egg)☆12Oct 31, 2024Updated last year
- Small extensions of the Bellman-Ford routines in NetworkX, primarily for convenience☆13May 7, 2018Updated 7 years ago
- ☆30Oct 30, 2020Updated 5 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- Three examples of how to configure AOP in a multi-project Spring Boot application.☆22Mar 26, 2017Updated 9 years ago
- ☆11Apr 22, 2020Updated 5 years ago
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- ☆13Nov 11, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- 你也可以做个Shadowsocks(Android篇)☆14Jan 30, 2022Updated 4 years ago
- ☆15Oct 2, 2024Updated last year
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- 处理语雀转markdown时的图片链接问题☆12May 16, 2022Updated 3 years ago
- Use mason's rule to simplify signal flow graphs in MATLAB☆11Mar 5, 2020Updated 6 years ago
- Anomaly detection in time evolving graphs☆13Aug 18, 2016Updated 9 years ago