User Guided API Misuse Detection
☆30Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for arbitrar
Users that are interested in arbitrar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆18Oct 5, 2021Updated 4 years ago
- An automatic API misuse checker for C programs!☆19Apr 3, 2019Updated 7 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Nov 5, 2021Updated 4 years ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- Python library for CPGQL server☆41Jun 4, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆25Oct 13, 2020Updated 5 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Sep 25, 2024Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆39Mar 8, 2023Updated 3 years ago
- A First Look at Conventional Commits Classification☆13Nov 18, 2024Updated last year
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Mar 24, 2021Updated 5 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- Plugins for Influx Telegraf☆10Mar 9, 2017Updated 9 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Artifact for TOSEM Submission: GiantRepair☆13Jun 26, 2024Updated last year
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- This repository is for the paper of ICSE 2023: Regression Fuzzing for Deep Learning Systems☆12Feb 21, 2024Updated 2 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Vulnerability database generator: a submodule for VUDDY☆14May 28, 2024Updated last year
- ☆12Apr 23, 2021Updated 4 years ago
- Patchwork client tool☆14Feb 26, 2024Updated 2 years ago
- Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project☆10Mar 14, 2024Updated 2 years ago
- An arbitrary-precision differentiable programming language.☆36Jul 7, 2023Updated 2 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 9 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- ☆12Aug 8, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- A toy WebAssembly(wasm) interpreter written in Swift☆16Jan 25, 2025Updated last year
- ☆17Oct 5, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆331Jun 6, 2018Updated 7 years ago