jazwiecki / neo4j-cveView external linksLinks
Graph database version of the CVE database
☆26Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for neo4j-cve
Users that are interested in neo4j-cve are comparing it to the libraries listed below
Sorting:
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 6 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆19Jul 19, 2024Updated last year
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆16Dec 22, 2025Updated last month
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- ☆17Dec 9, 2022Updated 3 years ago
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18May 24, 2024Updated last year
- QEmu backend for avatar²☆22Mar 29, 2025Updated 10 months ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- Dig through Git commits and logs☆21Jan 8, 2019Updated 7 years ago
- ☆26Jan 15, 2021Updated 5 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 6 years ago
- Data for vulnerabilityhistory.org☆28Jan 9, 2023Updated 3 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- Code to reproduce the experiments in the paper Open Vocabulary Learning on Source Code with a Graph-Structured Cache☆21Apr 15, 2019Updated 6 years ago
- A System for Debloating C/C++ Programs☆31Jul 16, 2021Updated 4 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Jul 30, 2016Updated 9 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week
- headless-ida-mcp-server☆28Apr 4, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago