calaylin / CodeStylometryLinks
Programmer De-anonymization via Code Stylometry
☆78Updated 7 years ago
Alternatives and similar repositories for CodeStylometry
Users that are interested in CodeStylometry are comparing it to the libraries listed below
Sorting:
- Programmer De-anonymization from Binary Executables☆87Updated 7 years ago
- Meta information for the DARPA open catalog project.☆56Updated 7 years ago
- ☆12Updated 9 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- KLEE in the browser☆52Updated 3 weeks ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Locality-sensitive hashing algorithm for text similarity comparisons☆58Updated 4 months ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- similarity digest hashing tool☆170Updated 4 years ago
- Eclipse plugin that synthesizes real Java code☆26Updated 10 years ago
- python library to manage and reduce lattices☆22Updated 8 years ago
- A Tool for Measuring String Similarity☆116Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆45Updated 9 years ago
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆183Updated 9 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- An implementation of the LSTAR Grammatical Inference Algorithm☆51Updated last year
- Tree-based Autofolding Software Summarization Algorithm☆42Updated 9 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Available for legacy purposes. New users please see Jalangi2 https://github.com/Samsung/jalangi2☆122Updated 10 years ago
- Path based Dynamic Analysis☆117Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Clonewise - Detecting Package Clones and Inferring Security Vulnerabilities on Entire Linux Distributions.☆24Updated 12 years ago
- A Z3-Based String Constraint Solver☆87Updated 5 years ago
- SEViz (Symbolic Execution VisualIZer) is a tool for visualizing symbolic execution-based test generation☆20Updated 9 years ago
- A user-first approach to threat modeling.☆17Updated 3 months ago
- Run information flow experiments on the Web☆39Updated 4 years ago
- Spying using Smartwatch and Deep Learning☆190Updated 8 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago