A curated list of research resources in automated vulnerability detection (AVD)
☆45Nov 25, 2024Updated last year
Alternatives and similar repositories for awesome-AVD
Users that are interested in awesome-AVD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- ☆14May 14, 2024Updated 2 years ago
- ☆10May 8, 2024Updated 2 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆67May 21, 2024Updated 2 years ago
- Code for the API, workload execution, and agents underlying the LLMail-Inject Adpative Prompt Injection Challenge☆23Apr 9, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Codes of PostEdit☆23Apr 28, 2025Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 3 months ago
- Ansible build for Afl++ Frida-Mode☆25May 11, 2026Updated last week
- Large Language Models Can Be Contextual Privacy Protection Learners☆16Oct 28, 2024Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Apr 3, 2024Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆20Dec 10, 2024Updated last year
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆18Oct 22, 2024Updated last year
- ☆21Jun 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- some hackz for gather.town☆16Feb 19, 2022Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆87Sep 1, 2025Updated 8 months ago
- Official Implementation of the ACL2024 Findings paper "Controllable Data Augmentation for Few-Shot Text Mining with Chain-of-Thought Attr…☆18May 18, 2024Updated 2 years ago
- ☆18Mar 10, 2026Updated 2 months ago
- An exploration of LLM steering☆26Jun 15, 2024Updated last year
- ☆11May 10, 2018Updated 8 years ago
- From Gradient Leakage to Adversarial Attacks in Federated Learning☆16Sep 21, 2021Updated 4 years ago
- Code for reproducing the results from "CrAM: A Compression-Aware Minimizer" accepted at ICLR 2023☆10Mar 1, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆27Aug 1, 2025Updated 9 months ago
- [SEKE 2023] This is the implementation code of Heterogeneous Directed Hypergraph Neural Network (HDHGN) model in the paper Heterogeneous …☆23Aug 23, 2025Updated 8 months ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆46Aug 6, 2025Updated 9 months ago
- Simple WireGuard interface monitoring☆13Apr 12, 2026Updated last month
- 中国农业大学计算机图形学完整代码和报告,欢迎参考学习☆11Dec 12, 2021Updated 4 years ago
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆45May 4, 2026Updated 2 weeks ago
- ICLR Blog Track 2025☆19Sep 21, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A dumb utility to help you mirror your GitLab and GitHub contributions.☆14Apr 3, 2025Updated last year
- 安全工具、个人作品 Forked from ForrestX386/x386.git☆21Dec 24, 2017Updated 8 years ago
- A git-style way of managing LLM chats☆32Jan 26, 2026Updated 3 months ago
- A feature-complete gate-level microcoded Intel 4004 in 4004 bytes of C, capable of emulating the original Busicom calculator ROM for whic…☆29Aug 5, 2025Updated 9 months ago
- The replication package of paper "Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks"☆28Jan 3, 2024Updated 2 years ago
- Exploit for CVE-2022–25765 (pdfkit) - Command Injection☆30Sep 12, 2025Updated 8 months ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆27Mar 18, 2025Updated last year