LLM Security Guard for Code
☆21Sep 8, 2024Updated last year
Alternatives and similar repositories for LLMSecGuard
Users that are interested in LLMSecGuard are comparing it to the libraries listed below
Sorting:
- ☆16Nov 24, 2023Updated 2 years ago
- ☆20May 27, 2020Updated 5 years ago
- Starter boilerplate for Restful API with Django, Django-rest-framework, Simplejwt, Mysql, and Docker.☆15May 12, 2024Updated last year
- cinspector - a static C source code analysis framework☆29Jun 20, 2024Updated last year
- ☆15Dec 31, 2025Updated 2 months ago
- Simple ORM made with PHP☆17Jul 10, 2021Updated 4 years ago
- ☆13Mar 20, 2025Updated last year
- SeamFuzz Artifact repository for ICSE 2023☆14Feb 10, 2023Updated 3 years ago
- ☆41May 7, 2024Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Mar 5, 2025Updated last year
- ☆21May 10, 2022Updated 3 years ago
- This is a centralized liquidity bot that uses the SDK released by Orca, one of Solana's DEXs. The HelloMoon API is used to forecast price…☆12Mar 23, 2023Updated 2 years ago
- Clonewise - Detecting Package Clones and Inferring Security Vulnerabilities on Entire Linux Distributions.☆25Feb 15, 2013Updated 13 years ago
- Some themes for TeXShop.☆10Oct 16, 2021Updated 4 years ago
- ☆35Jun 5, 2023Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 3 years ago
- Ansible role for installing docker registry☆14Feb 2, 2015Updated 11 years ago
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆18Sep 12, 2024Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- ☆15Mar 17, 2025Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- ☆16Apr 10, 2023Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- Sample code for deploying IAM password policies across a fleet of AWS accounts using CloudFormation StackSets☆10Nov 26, 2021Updated 4 years ago
- A simple, responsive, mobile-first Wordpress theme for the Thunderbird Blog☆11Apr 24, 2025Updated 10 months ago
- Download your Spotify playlists and songs along with album art and metadata (from YouTube if a match is found).☆24Aug 27, 2022Updated 3 years ago
- ORM for accessing indexedDB as a promise base api implementation.☆21Jan 18, 2024Updated 2 years ago
- ☆26Feb 12, 2015Updated 11 years ago
- Official PyTorch Implementation of Federated Learning with Positive and Unlabeled Data☆10Aug 12, 2022Updated 3 years ago
- Send request from web app to Saman Kish Central PCPOS Devices.☆36Dec 1, 2025Updated 3 months ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- NPM package for Signature Version 4 authentication on Amazon Managed Blockchain☆18Sep 19, 2023Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 3 years ago
- IMAP client and server implementation in Go☆30Dec 9, 2014Updated 11 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- ☆27Feb 2, 2026Updated last month
- ☆22Jul 25, 2024Updated last year