A curated list of research resources in automated vulnerability detection (AVD)
☆45Nov 25, 2024Updated last year
Alternatives and similar repositories for awesome-AVD
Users that are interested in awesome-AVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆56Jan 7, 2026Updated 3 months ago
- A python library to build graphs for programs written in different programming languages.☆13May 6, 2022Updated 3 years ago
- ☆11Apr 18, 2022Updated 4 years ago
- ☆10May 8, 2024Updated last year
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Say incantations to enjoy web designing.☆11Mar 9, 2018Updated 8 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- Get CLIP ViT text tokens about an image, visualize attention as a heatmap.☆15Aug 8, 2023Updated 2 years ago
- ☆16Nov 20, 2022Updated 3 years ago
- ☆16Apr 6, 2023Updated 3 years ago
- Codes of PostEdit☆23Apr 28, 2025Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Large Language Models Can Be Contextual Privacy Protection Learners☆16Oct 28, 2024Updated last year
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year
- american fuzzy lop - a security-oriented fuzzer☆11Feb 25, 2026Updated 2 months ago
- RobustBenchHAR: an adversarial robustness benchmark for Skeleton-based Human Activity Recognition [ICLR 2025 TASAR: TRANSFER-BASED ATTACK…☆22May 23, 2025Updated 11 months ago
- 南理工学生助手:课表,成绩和自习教室。☆10Aug 26, 2016Updated 9 years ago
- some hackz for gather.town☆16Feb 19, 2022Updated 4 years ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆19May 12, 2025Updated 11 months ago
- ☆21Jun 27, 2023Updated 2 years ago
- Trusted and Tested Asterisk Build for Call Control☆26Jul 13, 2016Updated 9 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- ☆18Mar 10, 2026Updated last month
- [TOSEM'26] Awesome-LLM4SVD from "A Systematic Literature Review on Detecting Software Vulnerabilities with Large Language Models"☆64Updated this week
- Detection of LLM-Generated Codes [ICSE2025]☆32Jul 5, 2025Updated 9 months ago
- An exploration of LLM steering☆26Jun 15, 2024Updated last year
- ☆11May 10, 2018Updated 7 years ago
- https://github.com/wcventure/FuzzingPaper☆10Jan 15, 2022Updated 4 years ago
- [ICML 2025] Official Implementation of "Hessian Geometry of Latent Space in Generative Models"☆18Aug 16, 2025Updated 8 months ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆15Mar 9, 2025Updated last year
- YetAnotherWandbClient☆13Mar 16, 2026Updated last month
- ICLR Blog Track 2025☆19Sep 21, 2025Updated 7 months ago
- OWASP Foundation web repository☆66Apr 10, 2026Updated 3 weeks ago
- An Inspect extension for agentic cyber evaluations☆27Apr 23, 2026Updated last week