NSSL-SJTU / VoAPI2Links
☆25Updated last year
Alternatives and similar repositories for VoAPI2
Users that are interested in VoAPI2 are comparing it to the libraries listed below
Sorting:
- SecCodeBench is a benchmark suite focusing on evaluating the security of code generated by large language models (LLMs).☆86Updated this week
- ☆42Updated 3 years ago
- ☆27Updated last year
- ☆61Updated 2 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆89Updated 5 months ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Updated 4 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆338Updated last year
- Awesome Large Language Models for Vulnerability Detection☆368Updated this week
- A structure-aware grey box fuzzer based on modeling the input processing logic.☆173Updated last year
- ☆18Updated 2 years ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Updated 2 years ago
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆135Updated last year
- ☆44Updated 11 months ago
- Corax for Java: A general static analysis framework for java code checking.☆254Updated last year
- ☆18Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Updated last year
- ☆30Updated 3 years ago
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆109Updated 5 years ago
- ☆10Updated last year
- ☆20Updated 2 weeks ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆184Updated last year
- Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing…☆404Updated 3 months ago
- oh my soot !☆93Updated 3 years ago
- MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps.☆31Updated last year
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50Updated 8 months ago
- ☆26Updated 3 years ago
- Some test samples for CPG execution logic.☆20Updated last year
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Updated last year
- ☆27Updated last year
- ☆203Updated 3 months ago