Finding potential software vulnerabilities from git commit messages
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
#计算机科学#Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated Software Engineering (ASE) 2021
#自然语言处理#Reproduction package for the paper "Automated Software Vulnerability Assessment with Concept Drift" in Mining Software Repositories (MSR) 2019.
(Course Work) Final Project/Presentation for CS 4177, Software Vulnerabilities. Showcases the use of Powershell-Empire, a now deprecated post-exploitation framework. [👾]
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Collection of Notes on How-to get started in Cybersecurity Vulnerability Research
My assignments on GDB and Computer Architecture; Buffer Overflow; Stack Overflow and ROP gadgets; ASLR; Heap Overflow; Type Confusion; Injection Attack; Fuzzing.
Reproduction package for the paper "A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites" in the Evaluation and Assessment in Software Engineering (EASE) 2021
Replication Package of the study described in “A Socio-technical Perspective on Software Vulnerabilities: A Causal Analysis”
List of vulnerabilities that I discovered.