Pypy233 / Interview-Collection
面试经验记录
☆14Updated 5 years ago
Alternatives and similar repositories for Interview-Collection
Users that are interested in Interview-Collection are comparing it to the libraries listed below
Sorting:
- 记录下自己的面经☆21Updated 6 years ago
- 软件工程统计方法作业☆8Updated 6 years ago
- A Socket-based group chat android app implemented in MVC, MVP, MVVM and FRP☆10Updated 5 years ago
- 南京大学软件学院操作系统2019届加分项☆10Updated 6 years ago
- ☆12Updated 2 years ago
- 近年来容器安全相关论文收集整理☆15Updated last year
- easy_Pwn☆19Updated 6 years ago
- Precision-guided context sensitivity for pointer analysis☆60Updated last year
- Study WALA and static code analysis . This project introduces the required knowledge and study roadmap.☆22Updated 4 years ago
- 程序分析大作业:使用 SOOT 框架,实现 Java 上的静态指针分析☆37Updated 6 years ago
- Software testing introduction. An introductory booklet written for friends who are interested in software quality assurance. 软件测试简介。为对软件质…☆28Updated 4 years ago
- source code backup of mooctest cases☆21Updated 6 years ago
- A points-to and alias analysis benchmark suite☆41Updated 6 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- Seminar 2016☆25Updated 8 months ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated 3 months ago
- ☆19Updated 2 years ago
- ☆12Updated last year
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆17Updated 6 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆20Updated 3 years ago
- ☆10Updated 4 years ago
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- ☆21Updated 2 months ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- JAVA指针分析☆13Updated 5 years ago
- Android Benchmark Reproduction Framework☆11Updated 3 years ago
- A list of data-only attacks☆19Updated this week
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 6 years ago