Security methods for WeAkNess detection
☆20Jan 26, 2026Updated last month
Alternatives and similar repositories for swan
Users that are interested in swan are comparing it to the libraries listed below
Sorting:
- Software vulnerabilities data set☆25Mar 4, 2020Updated 6 years ago
- This repository contains all CrySL rules currently used in the crypto assistant CogniCrypt.☆16Dec 15, 2025Updated 3 months ago
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Sep 6, 2017Updated 8 years ago
- SuSi - our tool to automatically discover sources and sinks in the Android framework☆151Jan 3, 2017Updated 9 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- ☆12May 9, 2022Updated 3 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- A vulnerability patch gathering tool☆44Jan 11, 2019Updated 7 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆29Jul 25, 2019Updated 6 years ago
- ☆13Feb 11, 2022Updated 4 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- Timetable planner for UQ courses, written in Typescript with React.☆14Jan 31, 2023Updated 3 years ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- Command line calendar display with holidays☆12Updated this week
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12May 14, 2024Updated last year
- Script for setting up ADB for debugging over wifi☆13Aug 12, 2019Updated 6 years ago
- A set of utilities and tools to detect and search AI-generated code☆28May 30, 2025Updated 9 months ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 10 months ago
- Artifact package accompanying our POPL 2020 submission titled Provenance-Guided Synthesis of Datalog Programs.☆19Jul 9, 2020Updated 5 years ago
- [Deprecated] Source Code Generation using Sequence Generative Adversarial Networks☆75Jan 7, 2017Updated 9 years ago
- sourced.ml is a library and command line tools to build and apply machine learning models on top of Universal Abstract Syntax Trees☆143May 22, 2019Updated 6 years ago
- Mandoline is an accurate, low-overhead dynamic slicer for Android applicaions.☆11Dec 24, 2025Updated 2 months ago
- Deceiving the Tapo app by impersonating a TP-Link device☆12Dec 11, 2023Updated 2 years ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- VSCode extension to streamline Maestro workflows and enhance productivity☆14Oct 10, 2024Updated last year
- ☆11Jun 5, 2015Updated 10 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆41Jul 8, 2021Updated 4 years ago
- python and honggfuzz☆26May 18, 2020Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- A deep learning-based vulnerability detection framework☆76Feb 29, 2024Updated 2 years ago
- Wireshark configuration profile for Zigbee traffic☆15May 5, 2022Updated 3 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- ☆20Nov 6, 2024Updated last year
- TamiFlex facilitates static analysis of programs that use reflection and custom class loaders☆44May 15, 2021Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Experimental web browser☆21Mar 15, 2012Updated 14 years ago
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year