calaylin / CodeStylometryLinks
Programmer De-anonymization via Code Stylometry
☆78Updated 8 years ago
Alternatives and similar repositories for CodeStylometry
Users that are interested in CodeStylometry are comparing it to the libraries listed below
Sorting:
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- Meta information for the DARPA open catalog project.☆56Updated 7 years ago
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆183Updated 9 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Eclipse plugin that synthesizes real Java code☆26Updated 11 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- ☆12Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Updated 9 years ago
- Run information flow experiments on the Web☆39Updated 4 years ago
- A Tool for Measuring String Similarity☆117Updated 6 years ago
- An implementation of the LSTAR Grammatical Inference Algorithm☆51Updated last year
- Probabilistic API Mining☆53Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- similarity digest hashing tool☆172Updated 4 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- 60 artisanal compiler crashes☆39Updated 9 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- Locality-sensitive hashing algorithm for text similarity comparisons☆58Updated 4 months ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- KLEE in the browser☆52Updated last month
- Code and templates required to build the DARPA open catalog.☆17Updated 9 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Updated 6 years ago
- Advanced similarity and duplicate source code at scale.☆56Updated 6 years ago
- Interchange format for results for static analysis tools☆63Updated last year
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- A tool to automatically generate pseudo-code from source code.☆170Updated 2 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Structured shrinking of unknown file formats☆96Updated 8 years ago