Source code understanding via Machine Learning techniques
☆138Jan 18, 2026Updated 2 months ago
Alternatives and similar repositories for awesome-source-analysis
Users that are interested in awesome-source-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine Learning for Source Code Analysis☆17Nov 20, 2023Updated 2 years ago
- Vine: The BitBlaze Static Analysis Component☆26Sep 27, 2014Updated 11 years ago
- Probing pre-trained source code models☆15Apr 27, 2022Updated 3 years ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Feb 19, 2020Updated 6 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- CMU 15-745 Spring 2014☆10Mar 7, 2014Updated 12 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Plugin to find duplicates in source code☆15Sep 12, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Demand-Driven Pointer Analysis☆14Apr 6, 2026Updated last week
- Tool for detecting violations of ordering axioms in STL comparators☆19Mar 30, 2025Updated last year
- Code Continuity Analysis Framework☆23Mar 3, 2025Updated last year
- Writeup that goes along with this:☆41Jan 18, 2018Updated 8 years ago
- A web page with resources for teaching with formal methods and tools.☆14Apr 8, 2023Updated 3 years ago
- Website for Learning from "Big Code"☆30Jun 19, 2021Updated 4 years ago
- DeepBugs is a framework for learning bug detectors from an existing code corpus.☆152Apr 7, 2021Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Garbage collector for Escargot☆15Feb 3, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Rascal implementation of the Jimple framework.☆13Apr 2, 2022Updated 4 years ago
- ☆16Aug 9, 2017Updated 8 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- Code to reproduce the experiments in the paper Open Vocabulary Learning on Source Code with a Graph-Structured Cache☆21Apr 15, 2019Updated 6 years ago
- A tool for mining commits from Git repositories and diffs to automatically extract code change pattern instances and features with ast a…☆100Nov 13, 2024Updated last year
- Computes the AST difference (aka edit script) between two Spoon Java source code abstract syntax trees☆179Apr 6, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Mar 22, 2024Updated 2 years ago
- A library for analyzing LLVM bitcode in Haskell☆43Oct 9, 2014Updated 11 years ago
- ☆23Oct 30, 2019Updated 6 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- A vulnerability patch gathering tool☆44Jan 11, 2019Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- ☆10May 12, 2023Updated 2 years ago