spring-epfl / WebGraph
☆14Updated 8 months ago
Alternatives and similar repositories for WebGraph:
Users that are interested in WebGraph are comparing it to the libraries listed below
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆66Updated last month
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆50Updated 3 weeks ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆59Updated last month
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆33Updated this week
- Gather pagegraph data from all over the internet☆24Updated this week
- ☆42Updated last month
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆21Updated 2 months ago
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated 11 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆65Updated last year
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated last year
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆14Updated 2 years ago
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- Create CFGs and compute complexity metrics for Python, C++, and Java code.☆42Updated 10 months ago
- ☆36Updated 5 months ago
- ☆132Updated 4 months ago
- RICC: Robust Collective Classification of Sybil Accounts☆11Updated last year
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆87Updated 10 months ago
- ☆24Updated 2 months ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆39Updated 11 months ago
- Utility library for analysis of Control Flow Graphs, home to the Basque CFGED algorithm.☆28Updated 2 months ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆25Updated 8 months ago
- ACER is an AST-based Callgraph Generator Development Framework☆32Updated 9 months ago