The code and dataset of the paper.
☆15Mar 27, 2025Updated 11 months ago
Alternatives and similar repositories for TransferFuzz
Users that are interested in TransferFuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Aug 30, 2024Updated last year
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Public version of CNEPS☆24Dec 30, 2024Updated last year
- ☆11Aug 21, 2024Updated last year
- only for request cve☆18Apr 16, 2025Updated 11 months ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 3 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- ☆32Jul 22, 2023Updated 2 years ago
- ☆13Jan 22, 2025Updated last year
- UAF Fuzzing Benchmark☆61Feb 22, 2021Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Arxiv地址:https://arxiv.org/abs/2409.01944☆22Feb 20, 2025Updated last year
- ☆11Sep 6, 2024Updated last year
- ☆22Jan 9, 2026Updated 2 months ago
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- An automated smart contract vulnerability repair tool☆12Aug 15, 2023Updated 2 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆41Nov 13, 2023Updated 2 years ago
- This is Github repository for "Forky" published in ICSE'25☆15Sep 15, 2025Updated 6 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated last year
- ☆24Dec 11, 2022Updated 3 years ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆30May 7, 2024Updated last year
- SolGPT智能合约(区块链)漏洞检测大模型 Solidity(Smart Contract) Vulnerability Detection Base on GPT Model☆14Dec 25, 2024Updated last year
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- bindiff and binexport binary file for IDA Pro 9.0.241217 SP1 and later versions☆22Apr 20, 2025Updated 11 months ago
- OGHarn: Oracle-guided Fuzzing Harness Generation☆52Dec 9, 2025Updated 3 months ago
- ☆14Oct 11, 2017Updated 8 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Source code for LLMxCPG paper☆127Feb 10, 2026Updated last month
- An overview of LLMs for cybersecurity.☆1,259Mar 13, 2026Updated last week
- ☆12Jan 9, 2025Updated last year
- ☆18Aug 12, 2019Updated 6 years ago
- ☆12Nov 19, 2025Updated 4 months ago
- This is the tool released in ICSE 2024 paper "Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Er…☆17Jun 5, 2023Updated 2 years ago
- PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language Models☆50Updated this week
- ☆24Apr 13, 2023Updated 2 years ago