EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
☆18Jan 6, 2025Updated last year
Alternatives and similar repositories for EatVul-Resources
Users that are interested in EatVul-Resources are comparing it to the libraries listed below
Sorting:
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts☆21May 11, 2024Updated last year
- ☆27Mar 16, 2023Updated 2 years ago
- ☆25Feb 6, 2024Updated 2 years ago
- This repository contains a PyTorch implementation of the ISSTA'24 paper "Graph Neural Networks for Vulnerability Detection: A Counterfact…☆33Jun 6, 2025Updated 9 months ago
- ☆26Sep 21, 2022Updated 3 years ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- ☆39Jun 23, 2025Updated 8 months ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- 基于Python实现的微信/QQ定时自动发送消息☆11Oct 15, 2024Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- ☆11Oct 17, 2024Updated last year
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- 《算法竞赛入门经典》第二版(第2版)-例题习题解答☆10May 10, 2021Updated 4 years ago
- ☆11May 14, 2024Updated last year
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Academic Papers about LLM Application on Security☆207Jun 30, 2025Updated 8 months ago
- ☆13Aug 25, 2021Updated 4 years ago
- This course is published by Packt Publishing☆22Aug 2, 2023Updated 2 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆13May 30, 2017Updated 8 years ago
- Open source library for decoding ambient Bluetooth Low Energy (BLE) advertising packet service data. We believe in an open Internet of T…☆10Jan 27, 2026Updated last month
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆43Apr 10, 2024Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- ☆10Apr 15, 2023Updated 2 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago