AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
☆42Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for AIBugHunter
Users that are interested in AIBugHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 14, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆359Mar 25, 2021Updated 5 years ago
- VulRepair: A T5-Based Automated Software Vulnerability Repair☆84May 13, 2025Updated 11 months ago
- ☆23Nov 10, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Feb 29, 2024Updated 2 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆77Jun 24, 2022Updated 3 years ago
- A Transformer-based Line-Level Vulnerability Prediction☆164Aug 5, 2024Updated last year
- Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction☆10May 10, 2021Updated 4 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- Simplified Source Code Pre-Training for Vulnerability Detection☆117Dec 4, 2025Updated 4 months ago
- ☆22Nov 17, 2021Updated 4 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Nov 24, 2023Updated 2 years ago
- Probing pre-trained source code models☆15Apr 27, 2022Updated 3 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- ☆14Apr 3, 2022Updated 4 years ago
- VulnerabilityDetectionResearch☆94Mar 22, 2022Updated 4 years ago
- ☆10Apr 15, 2023Updated 3 years ago
- open science repo of "Neural Transfer Learning for Repairing Security Vulnerabilities in C Code" https://arxiv.org/pdf/2104.08308☆63Feb 23, 2024Updated 2 years ago
- ☆83Jul 11, 2023Updated 2 years ago
- ☆29Mar 18, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆21Feb 25, 2023Updated 3 years ago
- ☆14Mar 1, 2023Updated 3 years ago
- ☆23Aug 6, 2020Updated 5 years ago
- ☆228Jul 25, 2024Updated last year
- ☆16Jan 17, 2024Updated 2 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆126Mar 27, 2026Updated 3 weeks ago
- Repository for PrimeVul Vulnerability Detection Dataset☆234Sep 7, 2024Updated last year
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆30Oct 10, 2024Updated last year
- ☆29Nov 7, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Dec 6, 2023Updated 2 years ago
- A Novel Benchmark evaluating the Deep Capability of Vulnerability Detection with Large Language Models☆34Apr 25, 2025Updated 11 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆117Apr 7, 2026Updated last week
- DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection (RAID 2023) https://surrealyz.github.io/…☆177Oct 23, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆258Jan 19, 2024Updated 2 years ago
- ☆13May 28, 2023Updated 2 years ago