calaylin / CodeStylometryLinks
Programmer De-anonymization via Code Stylometry
☆79Updated 8 years ago
Alternatives and similar repositories for CodeStylometry
Users that are interested in CodeStylometry are comparing it to the libraries listed below
Sorting:
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆187Updated 9 years ago
- KLEE in the browser☆52Updated 3 weeks ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Meta information for the DARPA open catalog project.☆56Updated 8 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- Eclipse plugin that synthesizes real Java code☆26Updated 11 years ago
- ☆12Updated 10 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Updated 9 years ago
- Probabilistic API Mining☆53Updated 7 years ago
- My little fuzzing framework inspired by grinder☆100Updated 8 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- Interchange format for results for static analysis tools☆63Updated last year
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- python library to manage and reduce lattices☆22Updated 8 years ago
- Path based Dynamic Analysis☆118Updated 8 years ago
- An implementation of the LSTAR Grammatical Inference Algorithm☆52Updated last year
- ☆50Updated 5 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- Binary analysis platform based on Octopus and Radare2☆78Updated 9 years ago
- Artifacts and other data for "Code Vectors: Understanding Programs Through Embedded Abstraced Symbolic Traces"☆22Updated 5 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆53Updated 6 years ago
- similarity digest hashing tool☆177Updated 5 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- A Z3-Based String Constraint Solver☆87Updated 5 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago