LauraWartschinski / VulnerabilityDetectionView external linksLinks
vulnerability detection in python source code with LSTM networks
☆151Mar 17, 2020Updated 5 years ago
Alternatives and similar repositories for VulnerabilityDetection
Users that are interested in VulnerabilityDetection are comparing it to the libraries listed below
Sorting:
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated last year
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆344Nov 17, 2020Updated 5 years ago
- Software vulnerability detection using machine learning through source codes (Exp-1). Replication of https://arxiv.org/abs/1807.04320.☆51Nov 24, 2021Updated 4 years ago
- ☆349Oct 24, 2024Updated last year
- ☆223Jul 25, 2024Updated last year
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- ☆82Jul 11, 2023Updated 2 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆256Jan 19, 2024Updated 2 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 9 months ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆113Dec 4, 2025Updated 2 months ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆72May 27, 2022Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated last year
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- ☆32Jul 13, 2022Updated 3 years ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- ☆102Oct 25, 2024Updated last year
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆160Aug 5, 2024Updated last year
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆29Jul 14, 2019Updated 6 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆81Mar 10, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆75Jun 24, 2022Updated 3 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ANTLR 3 fuzzy parser☆49Jan 21, 2013Updated 13 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆172Oct 23, 2024Updated last year
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- ☆11Jan 11, 2022Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆119Sep 2, 2025Updated 5 months ago
- A Mocktail of Source Code Representations - Consolidated Pipeline☆10Nov 6, 2022Updated 3 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆103Sep 2, 2023Updated 2 years ago