DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection (IJCNN 2021)
☆25May 14, 2023Updated 2 years ago
Alternatives and similar repositories for DeeSCVHunter
Users that are interested in DeeSCVHunter are comparing it to the libraries listed below
Sorting:
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆29Jul 14, 2019Updated 6 years ago
- Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE Accepted)☆120Feb 28, 2023Updated 3 years ago
- Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection (TSE Accepted)☆24Aug 23, 2022Updated 3 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 6 years ago
- Smart contract vulnerability detection using graph neural network (DR-GCN).☆156Feb 28, 2023Updated 3 years ago
- A python implementation of Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network.基于图神经网络的以太坊智能合约漏 洞检测方法…☆25Jul 7, 2023Updated 2 years ago
- [BlockSys 2022] Exploring deep learning techniques for Ethereum smart contract vulnerability detection.☆57Feb 18, 2023Updated 3 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- Dataset containing source code and deployed bytecode for Solidity Smart Contracts that have been verified on Etherscan.io, along with a c…☆25Jun 13, 2022Updated 3 years ago
- ReChecker: Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models☆57May 11, 2021Updated 4 years ago
- SolGPT智能合约(区块链)漏洞检测大模型 Solidity(Smart Contract) Vulnerability Detection Base on GPT Model☆14Dec 25, 2024Updated last year
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆100Feb 28, 2023Updated 3 years ago
- A Sequence Learning Approach to Detecting Vulnerabilities☆48Nov 17, 2021Updated 4 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆35Nov 24, 2023Updated 2 years ago
- ☆25Apr 25, 2024Updated last year
- This is a crawler with a tool of Jsoup. Furthermore. Moreover, there is a python version.☆18Apr 7, 2019Updated 6 years ago
- 基于源代码的图融合的智能合约漏洞检测☆23Apr 23, 2024Updated last year
- ☆45Jul 29, 2021Updated 4 years ago
- Datasets for evaluating smart contract security analysis tools ( continuously updating... )☆198Aug 21, 2023Updated 2 years ago
- MANDO-HGT is a framework for detecting smart contract vulnerabilities. Given either in source code or bytecode forms, MANDO-HGT adapts he…☆20Mar 7, 2024Updated 2 years ago
- Source Code for "A multi-modal transformer-based code summarization approach for smart contracts"☆27Mar 16, 2021Updated 4 years ago
- ☆25Jun 21, 2022Updated 3 years ago
- ☆31Dec 11, 2022Updated 3 years ago
- ☆61Jul 6, 2022Updated 3 years ago
- Repository of benchmarks to evaluate Solidity Smart contract analysis tools☆74Jun 16, 2022Updated 3 years ago
- Remove the Telegram deleted account members from your destination group☆10Oct 14, 2025Updated 4 months ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- A project to predict the crop yield using supervised machine learning algorithms☆15Oct 9, 2022Updated 3 years ago
- Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives (TPS23)☆111Jun 18, 2024Updated last year
- ☆14Sep 25, 2020Updated 5 years ago
- Tree-LSTM + Self-Structured Attention -- a method to summarize textual data by topics☆10Apr 26, 2018Updated 7 years ago
- Lightweight and fast UI for nodejs-pool based project, designed for c3pool.com☆10Mar 7, 2021Updated 5 years ago
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- NFT game using Polygon and Torus☆10Apr 30, 2021Updated 4 years ago