DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It detects vulnerabilities belonging to the OWASP categories listed in the Top 10 of 2021.
☆18Oct 24, 2025Updated 6 months ago
Alternatives and similar repositories for DeVAIC
Users that are interested in DeVAIC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- APK black-box obfuscator for my Master's project☆14May 2, 2021Updated 5 years ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆19Jan 20, 2021Updated 5 years ago
- ☆15May 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆22Mar 25, 2026Updated last month
- ☆15Jan 15, 2023Updated 3 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- ☆12Dec 22, 2025Updated 4 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆13Jul 18, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- An AI agent to use Ghidra with any AI.☆27Mar 31, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An attempt at simulating an ecosystem in a procedurally generated world using Unity☆30Sep 8, 2019Updated 6 years ago
- Window fonts for repo Thesis-Template-Bookdown☆15Sep 8, 2019Updated 6 years ago
- ArxivDaily☆13Updated this week
- The Speech Rate Meter (hereinafter SRM) software module is designed to measure a complex of characteristics of the tempo (rate) of oral s…☆23Jul 11, 2024Updated last year
- CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)☆51Updated this week
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆89Nov 4, 2023Updated 2 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆30Sep 1, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆15Oct 9, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆28Apr 22, 2026Updated last week
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 2 months ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- ☆26Aug 21, 2024Updated last year
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Flatten/Nest Javascript objects☆21Dec 21, 2023Updated 2 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆37Oct 6, 2022Updated 3 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 6 months ago
- Knowledge Report Alert & Normalization Generator☆26Apr 23, 2026Updated last week
- This is a course proect,using DWT,DCT,LSB & Arnold scrambling to hiding watermark within a RGB picture.☆11Jun 6, 2017Updated 8 years ago
- ☆21Mar 19, 2026Updated last month
- A comprehensive local Linux Privilege-Escalation Benchmark☆45Nov 7, 2025Updated 5 months ago
- Automated review process for your Azure AD guest accounts.☆17Sep 22, 2020Updated 5 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆22Jul 21, 2025Updated 9 months ago