VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)
☆51Jan 31, 2025Updated last year
Alternatives and similar repositories for vuddy
Users that are interested in vuddy are comparing it to the libraries listed below
Sorting:
- Vulnerability database generator: a submodule for VUDDY☆14May 28, 2024Updated last year
- VUDDY & hmark for IoTcube☆22Apr 28, 2023Updated 2 years ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆350Oct 24, 2024Updated last year
- ☆45Jun 22, 2022Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆345Nov 17, 2020Updated 5 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- 본 프로젝트는 KITRI BoB(Best of the Best) 10기에서 진행한 프로젝트로, 드론에 대한 취약성 연구를 진행한 내용을 기록하였습니다.☆40Jan 5, 2022Updated 4 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- ☆26Mar 31, 2023Updated 2 years ago
- The repo for V0Finder (Security 21)☆26Aug 8, 2021Updated 4 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- Staging area for work on Integer Overflow Checker (IOC), a clang extension that provides compiler flags to insert check for various sourc…☆22Oct 31, 2012Updated 13 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- repo for ctf☆22Apr 15, 2018Updated 7 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Oct 29, 2021Updated 4 years ago
- Physical Devices-Agnostic Hybrid Fuzzing of IoT Firmware☆12Mar 6, 2024Updated last year
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- The central ASPIRE framework repository, start here if you want to use our tools (this contains all tools and documentation)☆13Apr 17, 2021Updated 4 years ago
- An empirical study on patch correctness☆15Nov 5, 2022Updated 3 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- A System for Debloating C/C++ Programs☆31Jul 16, 2021Updated 4 years ago