spring-epfl / WebGraphLinks
☆15Updated last year
Alternatives and similar repositories for WebGraph
Users that are interested in WebGraph are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆109Updated last month
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆27Updated 3 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆63Updated 3 months ago
- ☆99Updated 2 months ago
- ☆65Updated 2 months ago
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆124Updated last month
- ☆25Updated last year
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆100Updated 10 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆63Updated this week
- ☆93Updated 4 months ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆98Updated 2 months ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Updated last year
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆282Updated last week
- Additional code and data for the automated malware generation paper☆13Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆87Updated 10 months ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆44Updated last year
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆43Updated 6 years ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Updated 3 years ago
- LLM security and privacy☆52Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆92Updated 7 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆65Updated 8 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆82Updated 2 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆78Updated 4 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Updated last year
- The automated prompt injection framework for LLM-integrated applications.☆242Updated last year