Fixing SySeVR.
☆12Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for ReSySeVR
Users that are interested in ReSySeVR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- https://github.com/SySeVR/SySeVR 项目的所需依赖和部分修改后的代码☆23Jun 23, 2020Updated 5 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆42Dec 29, 2023Updated 2 years ago
- ☆32Jul 13, 2022Updated 3 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- ☆17Jun 10, 2020Updated 5 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- ☆13Mar 22, 2024Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- ☆10Oct 8, 2022Updated 3 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- Data samples for Observability and SIEM☆15Oct 29, 2025Updated 4 months ago
- ☆16Nov 20, 2022Updated 3 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- ☆54Nov 19, 2022Updated 3 years ago
- pass-stream - pass-through node.js stream which can filter/adapt and pause data☆17Mar 3, 2017Updated 9 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆158Jun 28, 2023Updated 2 years ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆31May 16, 2023Updated 2 years ago
- ☆11May 14, 2024Updated last year
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- PatternFly 6 components for Vue 3☆24Jan 22, 2026Updated 2 months ago
- My blog☆10Oct 6, 2025Updated 5 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- 采用感知哈希算法基于Python-PIL的图像去重☆11Jul 30, 2018Updated 7 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- ☆13Feb 29, 2024Updated 2 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆183Sep 19, 2024Updated last year
- An efficient Lexer and recursive decent parser for c++ language. Implemented in Python☆11Jan 9, 2021Updated 5 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago