andymeneely / git-churnView external linksLinks
(ALPHA) A fast tool for collecting code churn metrics from git repositories.
☆17Nov 20, 2025Updated 2 months ago
Alternatives and similar repositories for git-churn
Users that are interested in git-churn are comparing it to the libraries listed below
Sorting:
- Multilayered secret detection tool☆41Feb 5, 2026Updated last week
- a viewer for for lancedb. including some actions like CRUD etc☆12Apr 27, 2025Updated 9 months ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- SNI respecting TLS reverse proxy that supports pluggable authentication☆16Nov 14, 2023Updated 2 years ago
- Tools for managing MacPorts’ infrastructure☆18Feb 3, 2026Updated last week
- AWS DynamoDB Hello World☆10Jun 5, 2015Updated 10 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- ☆32Nov 17, 2012Updated 13 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- ☆12Mar 9, 2025Updated 11 months ago
- This repository is an example Android application, which is based on Rails tutorial app.☆11Mar 20, 2017Updated 8 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 4 months ago
- Pact support for asynchronous messages☆12May 29, 2018Updated 7 years ago
- Database subsetting for local development and testing☆16Oct 15, 2022Updated 3 years ago
- A simple way of working with localised page objects in Selenium☆15May 9, 2023Updated 2 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated 11 months ago
- ☆17Mar 2, 2023Updated 2 years ago
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆17Aug 19, 2025Updated 5 months ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆18Feb 29, 2024Updated last year
- OIDC enablement for Fortran applications☆19Jan 27, 2025Updated last year
- ☆21Sep 10, 2024Updated last year
- Stores results of BDD tests with Cucumber-JVM in a database and provides reporting capabilities☆17Dec 13, 2018Updated 7 years ago
- Implementation of reinforcement learning algorithms in a cyber security simulation. Autonomous and Adaptive Systems (University of Bologn…☆10Sep 16, 2020Updated 5 years ago
- OPA Gatekeeper provider for GitHub Artifact Attestations☆19Feb 2, 2026Updated last week
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- This chrome extension will give you the relative xpath expression of one element to another☆14Mar 8, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- The official Implementation for TKDE paper "Individual and Structural Graph Information Bottlenecks for Out-of-Distribution Generalizatio…☆14Aug 6, 2023Updated 2 years ago
- ☆14Jul 13, 2022Updated 3 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆23Dec 25, 2025Updated last month
- AOBscan is a library for multi-threaded AOB memory scanning☆15Nov 17, 2022Updated 3 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆14Dec 19, 2022Updated 3 years ago
- This is the replication package of V-SZZ, which has been accepted by ICSE2022☆16Jan 19, 2026Updated 3 weeks ago
- Makefile and patch to build an NGINX binary statically linked against GNU libc.☆15Apr 14, 2021Updated 4 years ago
- Fuzzing Deep Learning Libraries Via Mining Security Knowledge from Open Source☆16May 14, 2024Updated last year
- An implementation for Sugyama's algorithm for displaying a layered graph.☆23Sep 21, 2025Updated 4 months ago
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year