📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)
☆21Oct 23, 2021Updated 4 years ago
Alternatives and similar repositories for Vulnerability-Detection-For-Source-Code
Users that are interested in Vulnerability-Detection-For-Source-Code are comparing it to the libraries listed below
Sorting:
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- Material of my talk/workshop "Smart contracts and Hacking 101"☆10Mar 31, 2025Updated 11 months ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆82Mar 10, 2022Updated 3 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- 一个简单的代理浏览器插件☆20Feb 9, 2026Updated 3 weeks ago
- ☆11Nov 22, 2021Updated 4 years ago
- Data pre-processing, analysis, visualization, D-reduction, and classification with different model/data -driven optimization techniques☆10Dec 29, 2019Updated 6 years ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段☆10Nov 26, 2021Updated 4 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- ☆11Apr 18, 2024Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Lemo Chain☆12Feb 25, 2023Updated 3 years ago
- ☆10Sep 22, 2022Updated 3 years ago
- jar or dex tools☆10Mar 24, 2016Updated 9 years ago
- Examples for usage python-ldap library☆11Dec 5, 2018Updated 7 years ago
- ☆12Oct 29, 2021Updated 4 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- A solution to hats.finance's first CTF challenge☆10May 7, 2022Updated 3 years ago
- A linter for Soufflé Datalog☆17Apr 1, 2024Updated last year
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Solidity gas optimization notes☆10Apr 27, 2023Updated 2 years ago
- Go library for parsing MRT format data☆12Mar 26, 2021Updated 4 years ago
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- Solidity CTF challenge from BSides TLV 2022☆14Jul 8, 2022Updated 3 years ago
- 域渗透脑图中文翻译版☆12Jan 26, 2022Updated 4 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- A tool for design pattern recognition on blockchain through static code analysis☆10Jun 8, 2024Updated last year
- ☆11Mar 19, 2022Updated 3 years ago
- An "Awesome List" for the Bitcoin Dev Kit Project☆11Jul 30, 2024Updated last year
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- ☆14Nov 9, 2023Updated 2 years ago