stanford-oval / genie-parserView external linksLinks
Neural Network Semantic Parser for Almond
☆15Apr 11, 2019Updated 6 years ago
Alternatives and similar repositories for genie-parser
Users that are interested in genie-parser are comparing it to the libraries listed below
Sorting:
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆16Dec 22, 2025Updated last month
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- ☆17Dec 9, 2022Updated 3 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18May 24, 2024Updated last year
- QEmu backend for avatar²☆22Mar 29, 2025Updated 10 months ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- Data for vulnerabilityhistory.org☆28Jan 9, 2023Updated 3 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- ☆26Jan 15, 2021Updated 5 years ago
- A System for Debloating C/C++ Programs☆31Jul 16, 2021Updated 4 years ago
- Code to reproduce the experiments in the paper Open Vocabulary Learning on Source Code with a Graph-Structured Cache☆21Apr 15, 2019Updated 6 years ago
- An open-source session replay tool for single-page applications that uses AI analysis, aggregated trends, and a RAG chatbot to help devel…☆11Jan 23, 2026Updated 3 weeks ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆22Updated this week
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Jul 30, 2016Updated 9 years ago
- headless-ida-mcp-server☆28Apr 4, 2025Updated 10 months ago
- 是APEX贡献的一个基于大数据平台能力的数据开发平台,帮助企业以最小成本实现链接数据,构建和沉淀数仓模型,降低数据应用门槛,沉淀数据价值。☆12Oct 31, 2024Updated last year
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Feb 6, 2026Updated last week
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago