s3c2 / llm-vulnerable-functionsView external linksLinks
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - DIMVA '24
☆16Aug 20, 2024Updated last year
Alternatives and similar repositories for llm-vulnerable-functions
Users that are interested in llm-vulnerable-functions are comparing it to the libraries listed below
Sorting:
- Libary for using OScam dvbapi within various applications. This Plugin is not for usage, only experiment and research.☆11Jan 4, 2024Updated 2 years ago
- MinuteTimers: A simple, free and beautiful online timer.☆12Jan 14, 2025Updated last year
- Build WSA Kernel with Docker☆17Oct 26, 2021Updated 4 years ago
- Collect paper metadata and abstract.☆16Feb 1, 2026Updated last week
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 8 months ago
- ☆11Jan 22, 2020Updated 6 years ago
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆18Jul 25, 2025Updated 6 months ago
- RLSB技术又称大数据区块链黑客技术 基于区块链5.0超融合一体机加云端全防御技术特殊恶意字符☆11Apr 27, 2023Updated 2 years ago
- CodeBERT based mutation testing tool.☆13Nov 10, 2025Updated 3 months ago
- Credential and sensitive information harvester for kubernetes environments.☆11Mar 2, 2021Updated 4 years ago
- ☆11Oct 30, 2024Updated last year
- Flannel network plugin for Kubernetes VXLAN Lua parser for Wireshark☆13Jul 6, 2020Updated 5 years ago
- BPF examples for Kubernetes☆14May 25, 2019Updated 6 years ago
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 12 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated last month
- 此 Repository 为 OctoMation 的应用仓库,系统详细文档、系统安装手册请移步以下 Repository:☆15Mar 27, 2025Updated 10 months ago
- 一本用代码写出来的Fuzzing书籍:The Fuzzing Book☆13Sep 30, 2023Updated 2 years ago
- 一个简单的CTF测试平台,做培训上用,目前没有做相关安全方面的策略,不要部署到线上☆14Aug 31, 2017Updated 8 years ago
- ipstatistics is a script based on the ipip library that is used to quickly filter the ip list.☆14Aug 21, 2020Updated 5 years ago
- JEST: N+1-version Differential Testing of Both JavaScript Engines☆14Jun 1, 2021Updated 4 years ago
- ☆13Jan 22, 2026Updated 3 weeks ago
- Collection of tools to build and run a distributed spamtrap system, consisting of IMAP and SMTP collectors and a backend that extracts at…☆12Oct 23, 2023Updated 2 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- ☆11Apr 18, 2020Updated 5 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Proposal of simple DNS blackhole/sinkhole solution based on custom software written in Go and PowerDNS Recursor + LUA plugin.☆18Aug 16, 2023Updated 2 years ago
- ☆23Jan 27, 2026Updated 2 weeks ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Library to ingest and generate VEX documents☆17Oct 2, 2025Updated 4 months ago
- Kubernetes deployment resources for Falco☆18Jan 29, 2026Updated 2 weeks ago
- Open Source Threat Intelligence Desktop Assistant. 划词情报查询助手☆18Aug 10, 2023Updated 2 years ago
- Integer overflow in FreeType software, which also affects Chrome☆23Aug 27, 2025Updated 5 months ago
- ☆14Feb 4, 2020Updated 6 years ago
- Fully Randomized Pointers☆19Jun 10, 2025Updated 8 months ago
- ☆12Jan 30, 2025Updated last year
- A cross-platform screen recording tool for ShockWave Flash (swf), Flash Video (flv), MPEG and raw VNCRev and noVNC format.☆12Apr 2, 2017Updated 8 years ago
- Philosopher emoji for all your online metaphysical needs.☆15Feb 23, 2018Updated 7 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago