SunLab-GMU / PySecDB
The official repository of ICSME'23 paper "Exploring Security Commits in Python"
☆18Updated last year
Alternatives and similar repositories for PySecDB:
Users that are interested in PySecDB are comparing it to the libraries listed below
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆41Updated last month
- ☆26Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆40Updated last year
- ☆26Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆27Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last week
- A fork of Bandit tool with patterns to identifying malicious python code.☆25Updated 2 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆17Updated 9 months ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆40Updated last year
- ☆44Updated 9 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆90Updated last year
- Testability Pattern Catalogs for SAST☆30Updated 2 months ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆24Updated 3 months ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- Home page of project "KB"☆123Updated 3 weeks ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆31Updated 4 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆123Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆30Updated 10 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Code Hierarchy Exploration Net (chen)☆20Updated this week
- Data for LLM4Vuln☆12Updated last year
- CodeQL Security Queries☆26Updated this week
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆54Updated 3 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago