Tokarev Igor's repositories
AIBugHunter
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
alphazero-general
A fast, generalized, and modified implementation of Deepmind's distinguished AlphaZero in PyTorch.
awesome-rl-for-cybersecurity
A curated list of resources dedicated to reinforcement learning applied to cyber security.
CodeGeeX
CodeGeeX: An Open Multilingual Code Generation Model
CodeRL
This is the official code for the paper CodeRL: Mastering Code Generation through Pretrained Models and Deep Reinforcement Learning (NeurIPS22).
CodeXGLUE
CodeXGLUE
CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
devign
Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks
DnD
A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis
ExploitGen
ExploitGen is a template-augmented Exploit Code generation method based on CodeBERT, which accepted in JSS..
FUNDED_NISL
FUNDED is a novel learning framework for building vulnerability detection models.
GraphSPD
The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, May 22-26, 2023.
Grounding_LLMs_with_online_RL
We perform functional grounding of LLMs' knowledge in BabyAI-Text
InformationSecurityOntology
Ontology of the area of Information Security, formalized in the OWL language
LineVul
A Transformer-based Line-Level Vulnerability Prediction
LLaMa-ToT
Tree of Thought Experiment with LLaMa Models
LM-finetune
Код для файнтюна LM (rugpt, LLaMa, FRED T5) средствами transformers + deepspeed + LoRa
malware_rl
Malware Bypass Research using Reinforcement Learning
picoGPT
An unnecessarily tiny implementation of GPT-2 in NumPy.
q_deep_learn_tfjs
It's example of QDeepLearning using TensorFlow.js
RL4RedTeam
A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trained to scan for vulnerabilities in the network and exploit them to gain access to various network resources.
SecBERT
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
tfjs-examples
Examples built with TensorFlow.js
VRepair
Vulnerability Repair scripts
VulBERTa
Simplified Source Code Pre-Training for Vulnerability Detection