Software Vulnerabilities to Weakness Mapping
☆24Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for V2W-BERT
Users that are interested in V2W-BERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Mar 1, 2023Updated 3 years ago
- ☆22May 10, 2022Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆171Aug 5, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 4 years ago
- ☆37Oct 27, 2021Updated 4 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- ☆10Dec 9, 2024Updated last year
- ☆56Nov 19, 2022Updated 3 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated last month
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- ☆14Aug 18, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆49Jul 24, 2022Updated 3 years ago
- [ISSTA 2025] A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing☆13Feb 9, 2025Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- Source Code for ICML 2022 paper "Boosting Graph Structure Learning with Dummy Nodes"☆19Apr 24, 2023Updated 3 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- ☆16Aug 26, 2023Updated 2 years ago
- Deployment code for ashirt-server☆20May 14, 2026Updated last week
- A framework of graph classification baselines which including TUDataset Loader, GNN models and visualization.☆16Jun 19, 2024Updated last year
- ☆18Mar 18, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆104Oct 25, 2024Updated last year
- TypeScript/JavaScript client libraries for Sliver☆27May 13, 2026Updated last week
- ☆13May 28, 2023Updated 2 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Apr 30, 2026Updated 3 weeks ago
- GPTCloneBench is a clone detection benchmark based on SemanticCloneBench and GPT.☆16Feb 5, 2025Updated last year
- ☆16Nov 20, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated last year
- ☆29Nov 7, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- MANDO-HGT is a framework for detecting smart contract vulnerabilities. Given either in source code or bytecode forms, MANDO-HGT adapts he…☆20Mar 7, 2024Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆102Apr 21, 2024Updated 2 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- This is a collection of MLflow examples that you can directly run with mlflow command☆31Sep 20, 2019Updated 6 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆10Dec 8, 2022Updated 3 years ago