Parsing-based Analyzer
☆75Jun 8, 2025Updated 10 months ago
Alternatives and similar repositories for LLMSCAN
Users that are interested in LLMSCAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An autonomous LLM-agent for large-scale, repository-level code auditing☆378Mar 12, 2026Updated last month
- LLMDFA: Analyzing Dataflow in Code with Large Language Models (NeurIPS 2024)☆206Oct 24, 2025Updated 6 months ago
- LLMSAN: Sanitizing Large Language Models in Bug Detection with Data-Flow (EMNLP Findings 2024)☆85Oct 24, 2025Updated 6 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 9 months ago
- Kernel isolation tester.☆18Oct 20, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- tool of llm-based indirect-call analyzer☆31Feb 18, 2025Updated last year
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated last year
- The repo of "BugLens"☆40Nov 12, 2025Updated 5 months ago
- ☆11Apr 21, 2026Updated last week
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- A continuously updated collection of papers on agentic SE maintained by PurCL group @ Purdue☆625Updated this week
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- The source code of project "LLift" (Enhancing static analysis with LLM)☆87Mar 5, 2024Updated 2 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆99Aug 12, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 3 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆33Sep 11, 2025Updated 7 months ago
- ☆39Jun 23, 2025Updated 10 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆39Jul 19, 2022Updated 3 years ago
- IDA Hexrays To Joern☆46Nov 7, 2024Updated last year
- ☆18Sep 23, 2024Updated last year
- YASA is an open-source static program analysis project. Its core innovation lies in a unified intermediate representation called UAST, d…☆269Apr 17, 2026Updated last week
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆19Mar 10, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Static Differential Analysis Tool of Network Protocol Parsers☆29Feb 21, 2024Updated 2 years ago
- ☆30Jan 15, 2026Updated 3 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆70Updated this week
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- This repo is for anonymized review. We will keep updating and optimizing this program.☆16Oct 18, 2024Updated last year
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆82Aug 5, 2025Updated 8 months ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆100Apr 21, 2024Updated 2 years ago
- Awesome Large Language Models for Vulnerability Detection☆672Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- some ida script☆33Aug 18, 2021Updated 4 years ago
- Dataflow-guided retrieval augmentation for repository-level code completion, ACL 2024 (main)☆34Mar 24, 2025Updated last year
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- Andersen's inclusion-based pointer analysis re-implementation in LLVM☆235Jun 19, 2019Updated 6 years ago
- The official Python SDK for Codellm-Devkit☆16Apr 14, 2026Updated 2 weeks ago