AutoVAS is an automated vulnerability analysis system with a deep learning approach.
☆35Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for AutoVAS
Users that are interested in AutoVAS are comparing it to the libraries listed below
Sorting:
- Vulnerability database generator: a submodule for VUDDY☆14May 28, 2024Updated last year
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆75Jun 24, 2022Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- A Clang/LLVM add-on to enforce coding rules☆33Nov 15, 2013Updated 12 years ago
- ☆16Nov 24, 2023Updated 2 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 2 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Official repository for the paper "GN-Transformer: Fusing AST and Source Code information in Graph Networks".☆17May 25, 2025Updated 9 months ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Dec 6, 2023Updated 2 years ago
- VulnerabilityDetectionResearch☆93Mar 22, 2022Updated 3 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- Machine Learning for Source Code Analysis☆17Nov 20, 2023Updated 2 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated last month
- ☆33Oct 15, 2018Updated 7 years ago
- ☆103Oct 25, 2024Updated last year
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- A Python implementation of a language-agnostic Code Property Graph☆19Jun 10, 2024Updated last year
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆350Oct 24, 2024Updated last year
- ☆39May 11, 2023Updated 2 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- ☆20May 27, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago