☆62Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for Centris-public
Users that are interested in Centris-public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Mar 31, 2023Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- A C/C++ dependency scanner☆41Nov 24, 2023Updated 2 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆62Sep 2, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- ☆57May 7, 2025Updated 10 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆181Apr 10, 2025Updated 11 months ago
- ☆36Oct 12, 2022Updated 3 years ago
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆39Dec 4, 2025Updated 3 months ago
- ☆24Jun 10, 2023Updated 2 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- Librarian: An Empirical Study of Security Updates in Android Apps’ Native Code☆22Jan 22, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Jan 31, 2025Updated last year
- ☆11Sep 28, 2022Updated 3 years ago
- A Comparative Study of Various Code Embeddings in Software Semantic Matching☆18Dec 8, 2022Updated 3 years ago
- An awesome & curated list of binary code similarity papers☆600Jan 5, 2026Updated 2 months ago
- Chrome Extension for visualizing browsing history☆11Sep 6, 2023Updated 2 years ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- Interprocedural Distributive Environment algorithm implementation☆16Jul 16, 2015Updated 10 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 2 years ago
- ☆308Jul 30, 2024Updated last year
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Jan 23, 2018Updated 8 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Sourcerer's Code Clone project☆220May 17, 2022Updated 3 years ago
- ☆21Nov 14, 2024Updated last year
- ICSE 2018 paper implement☆18Jan 8, 2019Updated 7 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Source-binary patch presence test system.☆84Jun 23, 2022Updated 3 years ago
- ☆49Oct 27, 2024Updated last year
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆30May 7, 2024Updated last year
- Reference GitHub Workflows for SBOM generation from the CISA SBOM Generation Reference Implementation Tiger Team☆34Feb 2, 2026Updated last month
- Statically built Nix binaries☆17Jan 27, 2020Updated 6 years ago
- ☆20Aug 30, 2024Updated last year
- An implementation of sparse-value flow analysis on top of soot (using Scala)☆10Dec 12, 2024Updated last year