spring-epfl / WebGraphLinks
☆15Updated 10 months ago
Alternatives and similar repositories for WebGraph
Users that are interested in WebGraph are comparing it to the libraries listed below
Sorting:
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- Programs generated by ChatGPT☆27Updated last year
- ☆114Updated 10 months ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆17Updated 4 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆77Updated 2 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆80Updated 4 months ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆18Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆31Updated 3 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated last year
- A crawler that uses OpenWPM.☆12Updated 3 years ago
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆71Updated last year
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆88Updated last year
- ☆12Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated last month
- LLM Program Watermarking☆17Updated last year
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆53Updated last month
- ☆29Updated 3 years ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆56Updated last week
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆52Updated last month
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆15Updated 2 years ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆35Updated this week
- ☆13Updated last week
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆107Updated 5 months ago