PatchEval: A New Benchmark for Evaluating LLMs on Patching Real-World Vulnerabilities
☆188Dec 26, 2025Updated 2 months ago
Alternatives and similar repositories for PatchEval
Users that are interested in PatchEval are comparing it to the libraries listed below
Sorting:
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆18Jun 4, 2024Updated last year
- SecNews 文章分享系统☆15Jun 6, 2018Updated 7 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆463Jan 15, 2026Updated last month
- ☆26Sep 15, 2024Updated last year
- ☆21Aug 25, 2024Updated last year
- Learning graph-based code representations for source-level functional similarity detection. ICSE'23☆59Mar 27, 2023Updated 2 years ago
- [2023 TDSC] Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?☆25Jun 2, 2023Updated 2 years ago
- The RustRAT client, server and payloads to be executed.☆30Sep 7, 2021Updated 4 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆67May 22, 2021Updated 4 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 4 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆81Oct 15, 2025Updated 4 months ago
- A neurosymbolic framework for vulnerability detection in code☆329Dec 5, 2025Updated 2 months ago
- ☆91Oct 23, 2025Updated 4 months ago
- A First Look at Conventional Commits Classification☆12Nov 18, 2024Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆91May 7, 2024Updated last year
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆36Jan 24, 2024Updated 2 years ago
- Multi-SWE-bench: A Multilingual Benchmark for Issue Resolving☆323Dec 18, 2025Updated 2 months ago
- java-agent内存马一键注入服务器维权工具,支持自定义路径、校验和内存马内容。☆126Nov 4, 2025Updated 3 months ago
- Copy: Linux process monitoring (exec, fork, exit, set*uid, set*gid)☆33May 18, 2022Updated 3 years ago
- ☆18Feb 18, 2026Updated last week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- An ANSI C library to parse and create PROXY protocol v1 and v2 headers☆13Apr 4, 2025Updated 10 months ago
- English Georgian Dictionary for iPhone☆21Apr 19, 2018Updated 7 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- A project for converting Processing codes of Daniel Shiffman's The Nature of Code into javascript codes using d3.js.☆21Mar 8, 2013Updated 12 years ago
- Clases de Implantación de Sistemas Operativos☆25Updated this week
- ☆13Aug 9, 2017Updated 8 years ago
- ☆13Oct 11, 2024Updated last year
- ☆20May 24, 2025Updated 9 months ago
- A lightweight and highly extensible Agent framework☆20Jan 20, 2026Updated last month
- ☆10Jan 21, 2022Updated 4 years ago