Pypy233 / Interview-CollectionLinks
面试经验记录
☆14Updated 5 years ago
Alternatives and similar repositories for Interview-Collection
Users that are interested in Interview-Collection are comparing it to the libraries listed below
Sorting:
- A Socket-based group chat android app implemented in MVC, MVP, MVVM and FRP☆10Updated 6 years ago
- 软件工程统计方法作业☆8Updated 7 years ago
- 记录下自己的面经☆21Updated 6 years ago
- sa-bAbI is a software assurance dataset generator similar to the natural language dataset generator☆27Updated 4 years ago
- A points-to and alias analysis benchmark suite☆41Updated 6 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆17Updated 6 years ago
- Trending Research Topics In Cybersecurity☆20Updated 5 years ago
- Neo4J visualisation tool for the Code Property Graph☆14Updated 4 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Updated 4 years ago
- This repo stores all challenges and writeups of CTFs we have participated in☆35Updated 6 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 7 months ago
- ☆12Updated 2 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- A simple and fast Java method extractor can quickly extract the Java method information in the project, including method, parameter, retu…☆18Updated 4 years ago
- Precision-guided context sensitivity for pointer analysis☆61Updated 2 years ago
- 程序分析大作业:使用 SOOT 框架,实现 Java 上的静态指针分析☆37Updated 6 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- ☆23Updated 6 years ago
- ☆13Updated 4 years ago
- 近年来容器安全相关论文收集整理☆15Updated 2 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using G…☆17Updated 3 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 6 years ago
- Works about detecting vulnerable using ML.☆85Updated 5 years ago
- ☆12Updated 4 years ago
- source code backup of mooctest cases☆21Updated 6 years ago
- Introducing CFG(control flow graph) and PDG (program dependency graph) into AST (abstract syntax tree) implementation using Java Paser an…☆24Updated 6 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 7 years ago
- https://www.cdxy.me/?p=806☆31Updated 6 years ago
- Python library for code analysis with CPG and Joern☆22Updated 2 years ago