Tencent / AICGSecEvalLinks
A repository-level AI-generated code security evaluation benchmark
☆126Updated last month
Alternatives and similar repositories for AICGSecEval
Users that are interested in AICGSecEval are comparing it to the libraries listed below
Sorting:
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆178Updated 11 months ago
- A structure-aware grey box fuzzer based on modeling the input processing logic.☆171Updated 10 months ago
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆185Updated 2 years ago
- SecCodeBench is a benchmark suite focusing on evaluating the security of code generated by large language models (LLMs).☆54Updated 2 weeks ago
- A declarative static analysis tool for jvm bytecode based Datalog like CodeQL☆339Updated last year
- ☆27Updated last year
- 零基础入门V8引擎漏洞挖掘☆275Updated last year
- Corax for Java: A general static analysis framework for java code checking.☆253Updated 8 months ago
- ☆41Updated 2 years ago
- ☆69Updated 2 years ago
- Some test samples for CPG execution logic.☆20Updated last year
- 静态分析及代码审计自动化相关资料收集☆296Updated 3 years ago
- ☆29Updated 2 years ago
- IoT固件漏洞挖掘工具☆244Updated 2 years ago
- ☆182Updated last month
- 一个搜索网络安全领域顶会论文的小工具☆88Updated 3 weeks ago
- oh my soot !☆91Updated 3 years ago
- ☆21Updated 3 years ago
- 智能家居安全相关参考。The related reference of smart home security including: paper, website, topic of Mi IoT.☆78Updated 3 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆77Updated last year
- ☆99Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆71Updated last year
- writeups for XNUCA2020Qualifier☆70Updated 4 years ago
- ☆28Updated 2 years ago
- ☆27Updated 3 years ago
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- Awesome Large Language Models for Vulnerability Detection☆226Updated last week
- Some IOT Integration of Technical Articles☆193Updated 2 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆115Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Updated last month