📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)
☆21Oct 23, 2021Updated 4 years ago
Alternatives and similar repositories for Vulnerability-Detection-For-Source-Code
Users that are interested in Vulnerability-Detection-For-Source-Code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- 📌 a poc framework supported for YAML and custom script☆12Mar 19, 2022Updated 4 years ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆83Mar 10, 2022Updated 4 years ago
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆10Jun 7, 2022Updated 3 years ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 6 years ago
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Mar 9, 2024Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- 一个可扩展的智能合约安全审计工具☆13Oct 13, 2020Updated 5 years ago
- 基于Java ASM技术和GadgetInspector的原理,尝试实现一个自动Java代码审计工具。目前做到了可控参数分析和数据流跟踪分析☆39Oct 26, 2021Updated 4 years ago
- ☆12Jul 23, 2021Updated 4 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- 处于原型阶段☆20Nov 30, 2021Updated 4 years ago
- 基于最新版本的thinkphp6.0以上底层编写的一整套纯净版后台,拥有前后端分离器,内置一键快速CURD命令,kbuilder快速构建器[一个方法增删改查],插件管理模块,高级视觉扁平化后台界面[独一的风格]☆14Oct 10, 2020Updated 5 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- ☆19Sep 7, 2025Updated 6 months ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- vulnerability detection in python source code with LSTM networks☆152Mar 17, 2020Updated 6 years ago
- Automatic Disassembly Desynchronization Obfuscator☆15Apr 14, 2022Updated 3 years ago
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 8 years ago
- A Windows kernel driver viewer and manager built in Rust — real-time enumeration, signature verification, SCM operations, and multi-for…☆115Mar 16, 2026Updated last week
- ☆12Sep 29, 2019Updated 6 years ago
- java反序列化漏洞笔记☆24Apr 6, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- 渗 透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc html-poc getshell csrf xss cms php-getshell domainmod-xss…☆13Jan 8, 2020Updated 6 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 5 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Data pre-processing, analysis, visualization, D-reduction, and classification with different model/data -driven optimization techniques☆10Dec 29, 2019Updated 6 years ago
- 《Spring漏洞研究》☆47Apr 26, 2022Updated 3 years ago