VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo
☆72Mar 25, 2025Updated last year
Alternatives and similar repositories for VulZoo
Users that are interested in VulZoo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Apr 23, 2026Updated 3 weeks ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆12Dec 5, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 3 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆137Mar 1, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- ADD extracts features from patches such as repair patterns.☆13Oct 2, 2023Updated 2 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆32Feb 23, 2022Updated 4 years ago
- ☆13Oct 14, 2025Updated 7 months ago
- 爬虫项目,用来爬取huntr网站的cve相关信息☆12May 10, 2023Updated 3 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆31Dec 1, 2023Updated 2 years ago
- Binary Code Summarization☆13Apr 3, 2025Updated last year
- ☆39Jun 23, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Feb 15, 2022Updated 4 years ago
- ☆42Feb 18, 2026Updated 3 months ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆15Jan 19, 2026Updated 4 months ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆33Jul 22, 2024Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆50Aug 9, 2023Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆85Oct 15, 2025Updated 7 months ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆149Jan 12, 2025Updated last year
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 4 years ago
- ☆13Apr 13, 2023Updated 3 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- Repository for PrimeVul Vulnerability Detection Dataset☆242Sep 7, 2024Updated last year
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆76May 10, 2026Updated last week
- ☆35Nov 11, 2021Updated 4 years ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆48Jun 19, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated 2 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆20Aug 4, 2022Updated 3 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆91Sep 18, 2025Updated 8 months ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆16Oct 28, 2025Updated 6 months ago