The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.
☆29Jan 22, 2025Updated last year
Alternatives and similar repositories for cloud-property-graph
Users that are interested in cloud-property-graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆91Jan 22, 2025Updated last year
- Kotlin data bindings for the Static Analysis Results Interchange Format (SARIF)☆24Updated this week
- CodeSec by Contrast - The fastest and most accurate SAST scanner. Scan code and serverless environments☆19Jan 9, 2024Updated 2 years ago
- Sharable Grakn knowledge graphs☆14Dec 28, 2022Updated 3 years ago
- CAT-probing: A Metric-based Approach to Interpret How Pre-trained Models for Programming Language Attend Code Structure, EMNLP 2022☆13Dec 10, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The heart & core of Privado code scanner☆32Nov 21, 2024Updated last year
- Code Property Graph: specification, query language, and utilities☆570Mar 27, 2026Updated last week
- ☆12May 29, 2018Updated 7 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- ShiftLeft OverflowDB☆135May 22, 2025Updated 10 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- A Python implementation of the SIEVE eviction algorithm☆19Jan 15, 2024Updated 2 years ago
- TamiFlex facilitates static analysis of programs that use reflection and custom class loaders☆44May 15, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 11 years ago
- Association of Computer Enthusiasts brings you with ACECTF. Test your hacking skills in our thrilling 24-hour cybersecurity challenge. Le…☆15Mar 2, 2025Updated last year
- ☆12Mar 23, 2026Updated 2 weeks ago
- Extend KIND networking capabilities with plugins using the KIND API☆41Nov 6, 2022Updated 3 years ago
- Flamegraph (Iciclegraph) swing component☆22Updated this week
- A generational genetic algorithm approach to Java Virtual Machine settings optimization for a variety of servers.☆21Aug 29, 2014Updated 11 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 3 months ago
- Git history navigation for dedicated methods, across all kinds of changes incl. complex refactorings.☆42Feb 1, 2024Updated 2 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 9, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple implementation of an "Error" [pseudo-]monad for Ruby.☆16Dec 29, 2015Updated 10 years ago
- Measuring and Controlling Persona Drift in Language Model Dialogs☆22Feb 26, 2024Updated 2 years ago
- Semantic language-agnostic source code schema☆16Sep 11, 2023Updated 2 years ago
- A tool to build a graph from a codebase☆14Feb 19, 2025Updated last year
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 10 months ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- Domain Specific Languages for Financial Systems Webpage☆12Mar 7, 2021Updated 5 years ago
- CSAW 2017 Embedded Security Challenge☆12Jun 7, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Static Trace-Based Deadlock Analysis for Synchronous Mini-Go☆19Apr 3, 2017Updated 9 years ago
- This project explores my adventures doing a deep dive of OpenAI embeddings with Neo4j during the Fixie AI + LLM Hackathon on Saturday, Se…☆15Sep 19, 2023Updated 2 years ago
- An Emacs mode to help you learn the proper Emacs movement keys☆17Jul 23, 2012Updated 13 years ago
- Towards converting multilingual source code into one language-agnostic graph representation.☆48Mar 22, 2023Updated 3 years ago
- ☆18Mar 31, 2026Updated last week
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- MCP Deobfuscate is a renaming tool suitable for obfuscation and deobfuscation of Java class files, and jar/zip bundles thereof.☆23Aug 14, 2013Updated 12 years ago