The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.
☆28Jan 22, 2025Updated last year
Alternatives and similar repositories for cloud-property-graph
Users that are interested in cloud-property-graph are comparing it to the libraries listed below
Sorting:
- Neo4J visualisation tool for the Code Property Graph☆14May 17, 2021Updated 4 years ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆91Jan 22, 2025Updated last year
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆27Jan 27, 2025Updated last year
- Kotlin data bindings for the Static Analysis Results Interchange Format (SARIF)☆23Updated this week
- ShiftLeft OverflowDB☆133May 22, 2025Updated 9 months ago
- The heart & core of Privado code scanner☆31Nov 21, 2024Updated last year
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆33Jan 10, 2026Updated last month
- ☆11Nov 14, 2024Updated last year
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- an External Function Auto-Completion Tool to Strengthen the Static Binary Lifting☆13May 13, 2024Updated last year
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- TCP Trafficgenerator and Proxy☆10Jan 8, 2026Updated last month
- Red Hat Enterprise Linux 7 Security Technical Implementation Guide in Sphinx☆11Dec 15, 2023Updated 2 years ago
- ☆10Nov 5, 2018Updated 7 years ago
- Git history navigation for dedicated methods, across all kinds of changes incl. complex refactorings.☆43Feb 1, 2024Updated 2 years ago
- TamiFlex facilitates static analysis of programs that use reflection and custom class loaders☆44May 15, 2021Updated 4 years ago
- Deploy the SC2 system on Kubernetes.☆10May 7, 2025Updated 9 months ago
- Useful tools for reverse out of the box (Unix compatible)☆11Aug 31, 2024Updated last year
- Flexible guide to performing code review☆10Jul 17, 2017Updated 8 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- AGV☆14Aug 29, 2015Updated 10 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- Frida depends on the excellent Capstone disassembly framework☆19Feb 6, 2026Updated 3 weeks ago
- 开发和运营:DevOps-Software development (Dev) and IT operations (Ops).☆12Feb 23, 2023Updated 3 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- A tool to build a graph from a codebase☆14Feb 19, 2025Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆17Apr 27, 2025Updated 10 months ago
- A long-running AI agent loop. Ralph automates software development tasks by iteratively working through a task list until completion.☆65Updated this week
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Towards converting multilingual source code into one language-agnostic graph representation.☆48Mar 22, 2023Updated 2 years ago
- Ref: API-Security-Checklist☆14Mar 31, 2023Updated 2 years ago