☆15May 6, 2022Updated 3 years ago
Alternatives and similar repositories for replication-kit-2020-line-validation
Users that are interested in replication-kit-2020-line-validation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- Tutorial: implementing doc2vec (paragraph vectors) from scratch in PyTorch☆14Apr 26, 2019Updated 6 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆73May 27, 2022Updated 3 years ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- A toolkit for pre-processing large source code corpora☆45Sep 30, 2022Updated 3 years ago
- Create subcommand-based command-line programs with docopt☆13Jan 6, 2020Updated 6 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 2 years ago
- ☆32Jul 13, 2022Updated 3 years ago
- new frontend design for rin-pr☆14Mar 3, 2018Updated 8 years ago
- A First Look at Conventional Commits Classification☆13Nov 18, 2024Updated last year
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Cyberspace Full Stack Bootcamp☆20Feb 17, 2026Updated last month
- Hosts our tool for mining simple "stupid'' bugs (SStuBs).☆38May 20, 2022Updated 3 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Updated this week
- ☆15Jan 15, 2023Updated 3 years ago
- Probing pre-trained source code models☆15Apr 27, 2022Updated 3 years ago
- Generate a jigsaw puzzle from an image☆22Mar 27, 2015Updated 10 years ago
- code2vec: Learning Distributed Representations of Code☆14Jun 27, 2018Updated 7 years ago
- This project provides several implementations for commit untangling and proposes a new representation of git patches by projecting the pa…☆12Jul 28, 2025Updated 7 months ago
- Artifacts for Smartian, a grey-box fuzzer for Ethereum smart contracts.☆17Jan 27, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ongoing project: a library for graph foundation model☆13Feb 7, 2024Updated 2 years ago
- ☆14May 14, 2024Updated last year
- ☆24Oct 15, 2023Updated 2 years ago
- Coding Monkey - iMessage Stickers.☆19May 24, 2019Updated 6 years ago
- Spring Data Provider for Vaadin 8 and 10☆14Aug 30, 2021Updated 4 years ago
- ☆12Nov 19, 2025Updated 4 months ago
- A simple pose detector which runs with the realsense framework.☆18Aug 31, 2021Updated 4 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆16Nov 7, 2022Updated 3 years ago
- Edge-Featured Graph Attention Network (EGAT) implementation for reaction and molecular property prediction☆12Feb 12, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆14May 28, 2024Updated last year
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- A collection of self-made tutorials in digital image processing, Fourier optics, Tensorflow usage, etc, in the form of IPython Notebooks.☆14Jul 14, 2020Updated 5 years ago
- ☆25Aug 6, 2025Updated 7 months ago
- This is a machine learning tutorial for software engineer.☆10Dec 6, 2018Updated 7 years ago
- Repository of benchmarks to evaluate Solidity Smart contract analysis tools☆16Jun 23, 2020Updated 5 years ago
- Security stuff for iac scripts☆16Apr 25, 2020Updated 5 years ago