SunLab-GMU / PySecDBLinks
The official repository of ICSME'23 paper "Exploring Security Commits in Python"
☆18Updated 2 years ago
Alternatives and similar repositories for PySecDB
Users that are interested in PySecDB are comparing it to the libraries listed below
Sorting:
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆60Updated 5 months ago
- ☆26Updated 2 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆18Updated last year
- ☆26Updated last year
- Automatically fuzz Rust projects from scratch☆56Updated last month
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- ☆48Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆41Updated 4 months ago
- OSS-Fuzz vulnerabilities for OSV.☆162Updated this week
- Testability Pattern Catalogs for SAST☆31Updated 6 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- Data about all known supply-chain attacks through history☆58Updated 3 months ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- Security Harness Engineering for Robust Program Analysis☆67Updated 2 weeks ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆59Updated last week
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆43Updated last week
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆44Updated last year
- CodeQL queries developed by Trail of Bits☆112Updated 2 months ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated 2 years ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆87Updated 4 months ago
- using ML models for red teaming☆44Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆220Updated this week
- Grammar-based HTTP/2 fuzzer with mutation ability☆47Updated 3 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆27Updated 3 years ago
- MegaVul - The largest, high-quality, extensible, continuously updated, C/C++/Java vulnerability dataset☆118Updated 7 months ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago