☆21Nov 14, 2024Updated last year
Alternatives and similar repositories for APP-Miner
Users that are interested in APP-Miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Sep 16, 2021Updated 4 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- ☆10Nov 9, 2023Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆20Jun 7, 2025Updated 9 months ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated 2 years ago
- ☆29Aug 7, 2025Updated 7 months ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Winnowing fingerprint extractor☆18Sep 12, 2025Updated 6 months ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 10 months ago
- ☆26May 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Mini-program Cross Page Request Forgery (MiniCPRF) Analysis Tool.☆18Oct 30, 2024Updated last year
- ☆11Aug 21, 2017Updated 8 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Oct 8, 2024Updated last year
- ☆25Apr 14, 2025Updated 11 months ago
- ☆26Nov 8, 2023Updated 2 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- ☆59Dec 8, 2023Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- FirmSec Dataset☆12Sep 1, 2021Updated 4 years ago
- IDA (sort of) headless☆28Feb 17, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- Code of KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations (USENIX Security'23)☆92Aug 31, 2023Updated 2 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Header information parser for PE, ELF, DEX, MachO, ZIP (JAR, DocX).☆16Oct 30, 2025Updated 4 months ago