HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs
☆43Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for HiddenCPG
Users that are interested in HiddenCPG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Feb 19, 2024Updated 2 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- A Python implementation of a language-agnostic Code Property Graph☆19Jun 10, 2024Updated last year
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆18Jun 21, 2025Updated 9 months ago
- RICC: Robust Collective Classification of Sybil Accounts☆11Jul 12, 2023Updated 2 years ago
- A collection of JavaScript test suites from JavaScript engine & Test262 repositories.☆22Sep 23, 2020Updated 5 years ago
- CFG based program similarity using Graph Neural Networks☆36Mar 21, 2023Updated 3 years ago
- ☆44Jan 30, 2023Updated 3 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Feb 19, 2020Updated 6 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆89May 3, 2024Updated last year
- ☆61Apr 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Mar 18, 2024Updated 2 years ago
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- Code for the paper - Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graph☆98Apr 21, 2024Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Dec 1, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆28Jan 27, 2025Updated last year
- ☆350Oct 24, 2024Updated last year
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Received CVE list☆12Dec 24, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Codee☆17Dec 9, 2020Updated 5 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆103Nov 28, 2023Updated 2 years ago
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆21Oct 23, 2021Updated 4 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆227Jul 25, 2024Updated last year
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 10 months ago