☆27Mar 31, 2023Updated 3 years ago
Alternatives and similar repositories for MOVERY-public
Users that are interested in MOVERY-public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆63Jan 3, 2024Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- The repo for V0Finder (Security 21)☆26Aug 8, 2021Updated 4 years ago
- ReDeBug Source Code.☆25Dec 12, 2023Updated 2 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Jan 31, 2025Updated last year
- ICSE 2018 paper implement☆18Jan 8, 2019Updated 7 years ago
- Public version of CNEPS☆23Dec 30, 2024Updated last year
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆51Sep 25, 2024Updated last year
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆41Dec 4, 2025Updated 5 months ago
- A Python package that demontrates arbitrary code execution during the install process of a Python package.☆11Sep 28, 2014Updated 11 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PyPI malware packages☆60Dec 12, 2018Updated 7 years ago
- PyDFix is a tool that helps detect and fix dependency errors that cause the unreproducibility of Python builds. PyDFix takes as input the…☆12Feb 7, 2023Updated 3 years ago
- ☆25Mar 18, 2026Updated 2 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Sep 29, 2023Updated 2 years ago
- A C/C++ dependency scanner☆40Nov 24, 2023Updated 2 years ago
- Public-facing course info for program analysis materials.☆44Dec 4, 2025Updated 5 months ago
- FixMorph is a morphing tool for C source codes which supports automated code-transfer☆36Apr 9, 2025Updated last year
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- CodeBERT based mutation testing tool.☆13Nov 10, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Feb 2, 2024Updated 2 years ago
- Tool for automatic extraction of dynamic metadata from nodejs applications☆15Oct 6, 2023Updated 2 years ago
- ☆40May 31, 2024Updated last year
- Rust and C Benchmarks☆15Nov 21, 2024Updated last year
- ☆11Oct 10, 2018Updated 7 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 6 years ago
- My portfolio contains a lexer generator, a parser generator, my own λProlog interpreter, and several meta-theorems for the propositional …☆14Updated this week
- Clone detector using N-gram, Inverted index, and LCS☆20Jan 12, 2025Updated last year
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 📝 A Rocq library written by members of PnV Discord Server☆18Updated this week
- ☆25Nov 15, 2021Updated 4 years ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆25May 8, 2024Updated 2 years ago
- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24☆16Aug 20, 2024Updated last year
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- 这个脚本主要提供对pypi供应链的源头进行安全扫描研究,扫描并发现未知的恶意包情况。☆28May 22, 2023Updated 2 years ago
- Debugging library to quickly get the minimal crashing test case☆37May 17, 2018Updated 8 years ago