Software Vulnerabilities to Weakness Mapping
☆24Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for V2W-BERT
Users that are interested in V2W-BERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Feb 29, 2024Updated 2 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 4 years ago
- ☆37Oct 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Deep Program Structure Modeling ThroughMulti-Relational Graph-based Learning☆10May 24, 2021Updated 4 years ago
- ☆10Dec 9, 2024Updated last year
- ☆56Nov 19, 2022Updated 3 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- (AAAI 2026) OSVBench, a new benchmark for evaluating Large Language Models (LLMs) in generating complete specification code pertaining to…☆13May 13, 2025Updated 10 months ago
- 适用于深澜4K校园网的轻量化自动登录脚本。北航校园网验证通过。☆12Jun 17, 2025Updated 9 months ago
- TSED with Flexible Parser☆19Jan 22, 2026Updated 2 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- ☆12Aug 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- This is the tool released in ICSE 2024 paper "Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Er…☆17Jun 5, 2023Updated 2 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- ☆10Jul 19, 2023Updated 2 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- ☆15Aug 27, 2022Updated 3 years ago
- ☆83Jul 11, 2023Updated 2 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A library to generate AST, CFG, PDG for Java program☆15Jun 13, 2021Updated 4 years ago
- Implementation and datasets for "Training Language Models to Generate Quality Code with Program Analysis Feedback"☆42Jul 21, 2025Updated 8 months ago
- GPTCloneBench is a clone detection benchmark based on SemanticCloneBench and GPT.☆16Feb 5, 2025Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆98Apr 21, 2024Updated last year
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Jan 31, 2025Updated last year
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆34Jun 6, 2025Updated 10 months ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Sep 27, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆20Mar 20, 2025Updated last year
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 5 months ago
- ☆23Nov 10, 2023Updated 2 years ago