Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation
☆17Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for SVCP4CDataset
Users that are interested in SVCP4CDataset are comparing it to the libraries listed below
Sorting:
- ☆18Dec 16, 2024Updated last year
- Labeled vulnerable functions statistics analysis and neural network training☆29Jul 25, 2019Updated 6 years ago
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- Port of libgcov portions to enable a way to generate GCDA files for embedded systems☆34Nov 5, 2016Updated 9 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- オリジナルの漢字テストを作成するWebアプリ☆12Mar 5, 2024Updated 2 years ago
- ☆15Feb 18, 2025Updated last year
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- Repository containing the PhD Thesis "Formal Verification of Deep Reinforcement Learning Agents"☆11Aug 29, 2022Updated 3 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Realize The Automation of UAV Cluster by Reinforcement Learning Approach☆12May 21, 2018Updated 7 years ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 6 months ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Automatically distribute GitHub Actions workflow across repositories.☆12Updated this week
- Visual automation with Backstop JS☆10Jan 22, 2026Updated last month
- A dark retro theme for Zola☆35Dec 29, 2025Updated 2 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Jupyter book showing how to build an ML powered book genre classifier☆13Oct 16, 2024Updated last year
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- An implementation of vdist2vec model in paper A Learning Based Approach to Predict Shortest-Path Distances☆11Apr 8, 2022Updated 3 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- Machine Learning meets eBPF☆15Apr 24, 2023Updated 2 years ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- Privateer is a plugin-based framework for security & compliance evaluations.☆18Updated this week
- Showcasing the potential of SPIFFE with real-life services☆10Jan 27, 2026Updated last month
- ☆47Jul 15, 2022Updated 3 years ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- This guidance focuses on the part of payments processing systems that post payments to recieving accounts. In this phase, inbound transac…☆21Sep 22, 2025Updated 5 months ago
- Fast subset and superset queries based on tries.☆11Jun 21, 2023Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Intune scripts for macOS☆14Jun 20, 2022Updated 3 years ago
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆20Updated this week