spring-epfl / WebGraph
☆14Updated 8 months ago
Alternatives and similar repositories for WebGraph:
Users that are interested in WebGraph are comparing it to the libraries listed below
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆70Updated 2 months ago
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆65Updated 2 weeks ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆30Updated 3 years ago
- Gather pagegraph data from all over the internet☆26Updated last week
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated last year
- ☆48Updated 2 months ago
- ☆37Updated 6 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated last week
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆33Updated last week
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated last month
- Awesome list for asm2vec☆18Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- ☆26Updated 7 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆88Updated 11 months ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆22Updated last week
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- ☆12Updated 2 years ago
- Protocol Inspection and State Machine Analysis☆24Updated 6 years ago
- ☆111Updated 9 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- A library to facilitate the static analysis of Android apps☆14Updated 8 months ago
- PDF Malware Parser☆20Updated 8 years ago