A curated list of research resources in automated vulnerability detection (AVD)
☆45Nov 25, 2024Updated last year
Alternatives and similar repositories for awesome-AVD
Users that are interested in awesome-AVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🎮 A configurable Breakout environment for reinforcement learning☆11Mar 20, 2018Updated 8 years ago
- Code for the API, workload execution, and agents underlying the LLMail-Inject Adpative Prompt Injection Challenge☆22Mar 1, 2026Updated last month
- Say incantations to enjoy web designing.☆11Mar 9, 2018Updated 8 years ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆20Sep 1, 2025Updated 7 months ago
- ☆22Sep 5, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Apr 6, 2023Updated 3 years ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Apr 3, 2024Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆18Dec 10, 2024Updated last year
- The supplementary material for the paper "Fine-tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code R…☆16Aug 12, 2024Updated last year
- american fuzzy lop - a security-oriented fuzzer☆11Feb 25, 2026Updated last month
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆18Oct 22, 2024Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆20Jun 27, 2023Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- ☆25Jan 20, 2025Updated last year
- Awesome-LLM4SVD from "A Systematic Literature Review on Detecting Software Vulnerabilities with Large Language Models"☆63Mar 20, 2026Updated 3 weeks ago
- ☆21Mar 18, 2025Updated last year
- Detection of LLM-Generated Codes [ICSE2025]☆32Jul 5, 2025Updated 9 months ago
- An exploration of LLM steering☆26Jun 15, 2024Updated last year
- Official code for EnvSDD (Environmental Sound Deepfake Detection)☆31Dec 13, 2025Updated 3 months ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆26Aug 1, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- QEMU Containers for Windows☆24Updated this week
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- ☆14Mar 9, 2025Updated last year
- CodeQL queries developed by Trail of Bits☆157Apr 3, 2026Updated last week
- A simple Joern MCP Server.☆37Nov 14, 2025Updated 4 months ago
- A very hacky set of functions for getting plotly to do what I want when doing mech interp research, designed to be compatible with PyTorc…☆13Jun 16, 2023Updated 2 years ago
- Get whois for any domain whose registry supports whois protocol☆13Jun 9, 2018Updated 7 years ago
- YetAnotherWandbClient☆13Mar 16, 2026Updated 3 weeks ago
- 一键搭建调试 pwn 题的 docker 环境☆26Jan 22, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆16Feb 14, 2023Updated 3 years ago
- Simple WireGuard interface monitoring☆13Mar 29, 2026Updated last week
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- 中国农业大学计算机图形学完整代码和报告,欢迎参考学习☆10Dec 12, 2021Updated 4 years ago
- Generate the Tracy-Widom distribution functions for beta = 1, 2, or 4 in Python☆10Mar 15, 2025Updated last year
- A dumb utility to help you mirror your GitLab and GitHub contributions.☆14Apr 3, 2025Updated last year