FMZennaro / CTF-SQLLinks
Modelling SQL Injection Using Reinforcement Learning
☆19Updated 3 years ago
Alternatives and similar repositories for CTF-SQL
Users that are interested in CTF-SQL are comparing it to the libraries listed below
Sorting:
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆71Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated last month
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆250Updated 10 months ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆64Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆35Updated 5 months ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆73Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- A deep learning-based vulnerability detection framework☆76Updated last year
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆72Updated 3 years ago
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆35Updated last month
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Repository for PrimeVul Vulnerability Detection Dataset☆146Updated 9 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆36Updated 11 months ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆89Updated 3 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆107Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆78Updated 3 weeks ago
- vulnerability detection in python source code with LSTM networks☆143Updated 5 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆75Updated last year
- A Novel Benchmark evaluating the Deep Capability of Vulnerability Detection with Large Language Models☆25Updated last month
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆145Updated 7 months ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆47Updated 11 months ago
- ☆46Updated 6 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Updated 6 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- ☆43Updated 8 months ago