Security stuff for iac scripts
☆16Apr 25, 2020Updated 5 years ago
Alternatives and similar repositories for IacSec
Users that are interested in IacSec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyExplainer: A Local Rule-Based Model-Agnostic Technique (Explainable AI)☆30Jun 21, 2024Updated last year
- Graphviz DOT grammar for tree-sitter.☆19Oct 21, 2025Updated 5 months ago
- ☆17Oct 5, 2020Updated 5 years ago
- ☆11May 14, 2024Updated last year
- code2vec: Learning Distributed Representations of Code☆14Jun 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 16, 2023Updated 2 years ago
- Stanford CoreNLP examples in Scala☆11Jan 12, 2017Updated 9 years ago
- Python module for tracking stock portfolio performance based on price changes and dividend payouts only, rather than value of deposits.☆12Mar 18, 2020Updated 6 years ago
- ☆19May 2, 2019Updated 6 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆22Mar 25, 2026Updated 3 weeks ago
- An open-source license compliance analysis and license recommendation tool.☆28Sep 30, 2025Updated 6 months ago
- The source code and data for paper "Identifying Self-admitted Technical Debt in Open Source Projects Using Text Mining"☆10Jan 20, 2017Updated 9 years ago
- code companion to manuscript☆14Feb 21, 2024Updated 2 years ago
- ☆11Jan 10, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- # MNIST dataset downloaded from Kaggle : #https://www.kaggle.com/c/digit-recognizer/data☆14Sep 5, 2019Updated 6 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆15Jan 19, 2026Updated 3 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 9 months ago
- Database smell detector☆13Jan 24, 2018Updated 8 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Explainable AI for Software Engineering: A Hands-on Guide on How to Make Software Analytics More Practical, Explainable, and Actionable (…☆27Nov 14, 2021Updated 4 years ago
- ☆25Jan 24, 2022Updated 4 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆21Feb 25, 2023Updated 3 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Assessing Source Code Semantic Similarity with Unsupervised Learning☆40Feb 27, 2018Updated 8 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- bil verification tool☆12Jun 30, 2022Updated 3 years ago
- Dwarf script to collect network requests and display on data panel☆21Mar 4, 2020Updated 6 years ago