☆19Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for VulHunter
Users that are interested in VulHunter are comparing it to the libraries listed below
Sorting:
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A…☆16Apr 24, 2023Updated 2 years ago
- ☆15Aug 27, 2022Updated 3 years ago
- ☆11May 30, 2024Updated last year
- ☆46Jul 29, 2021Updated 4 years ago
- MANDO-GURU, a deep graph learning-based tool, aims to accurately detect vulnerabilities in smart contract source code at both coarse-grai…☆30Feb 28, 2023Updated 3 years ago
- “CBGRU: A Detection method of Smart Contract Vulnerability Based on Hybrid Model”☆12May 29, 2022Updated 3 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆34Feb 28, 2023Updated 3 years ago
- 基于源代码的图融合的智能合约漏洞检测☆24Apr 23, 2024Updated last year
- Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives (TPS23)☆111Jun 18, 2024Updated last year
- Extracting graph data from smart contract source code☆13Feb 28, 2023Updated 3 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆35Nov 24, 2023Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection (IJCNN 2021)☆25May 14, 2023Updated 2 years ago
- Dataset containing source code and deployed bytecode for Solidity Smart Contracts that have been verified on Etherscan.io, along with a c…☆25Jun 13, 2022Updated 3 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection (TSE Accepted)☆24Aug 23, 2022Updated 3 years ago
- 率土之滨的助手程序,配置队伍模拟对局☆19Mar 12, 2026Updated last week
- Smart contract vulnerability detection using graph neural network (DR-GCN).☆158Feb 28, 2023Updated 3 years ago
- A dynamic checker for the ECF property incorporated into geth☆15Oct 27, 2017Updated 8 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks (IJCAI-20 Accepted)☆150Feb 28, 2023Updated 3 years ago
- NFT game using Polygon and Torus☆10Apr 30, 2021Updated 4 years ago
- FFMpeg 处理音视频同步的过程分析☆11Dec 30, 2014Updated 11 years ago
- ☆29Sep 15, 2025Updated 6 months ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆100Feb 28, 2023Updated 3 years ago
- Libertix installs linux in few clicks on your computer☆55Feb 21, 2025Updated last year
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13May 28, 2021Updated 4 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- ☆49Jan 14, 2025Updated last year
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- Betting dApp on Ethereum simulating a coin flip☆12Jan 7, 2021Updated 5 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- HuangGai is an Ethereum smart contract bug injection framework, it can inject 20 types of bugs into Solidity smart contract. DOI: 10.5281…☆44Dec 15, 2021Updated 4 years ago
- An implementation of Tare.☆12Feb 23, 2024Updated 2 years ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS Accepted).☆50Feb 28, 2023Updated 3 years ago
- ☆20Jan 16, 2025Updated last year
- A new model for quickly training and simulating adaptive leaky integrate-and-fire spiking neural networks.☆14Apr 9, 2024Updated last year
- 基于LSB算法隐藏数据到图片,支持png、bmp等无损压缩的图片格式☆12May 13, 2021Updated 4 years ago