Static heap reachability analysis for Java bytecode and Android memory leak finder.
☆32Oct 25, 2014Updated 11 years ago
Alternatives and similar repositories for thresher
Users that are interested in thresher are comparing it to the libraries listed below
Sorting:
- Goal-directed static analysis tool for JVM languages.☆58May 17, 2016Updated 9 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- Artifacts and other data for "Code Vectors: Understanding Programs Through Embedded Abstraced Symbolic Traces"☆22Jun 5, 2020Updated 5 years ago
- egraph on top of sqlite☆13Mar 8, 2022Updated 4 years ago
- Securibench Micro is a benchmark for static analysis tools for security.☆26Jul 26, 2018Updated 7 years ago
- ☆21Mar 1, 2026Updated 3 weeks ago
- Software Analysis and Verification Group☆15Nov 11, 2025Updated 4 months ago
- A lightweight dependency injection framework for Android.☆34Jun 13, 2017Updated 8 years ago
- Inconsistent code detection for Java.☆14Jan 26, 2018Updated 8 years ago
- Benchmarks for SyGuS Competition (SyGuS-Comp)☆43Mar 30, 2023Updated 2 years ago
- Equivalent and redundant mutant detection with e-graphs!!!☆13Jun 14, 2023Updated 2 years ago
- JVM Abstracting Abstract Machine☆25Jan 29, 2019Updated 7 years ago
- ☆12Jun 10, 2025Updated 9 months ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆11Dec 31, 2019Updated 6 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- Linq-like functions for Java Arraylist☆22Aug 1, 2019Updated 6 years ago
- A set of basic tools for manipulating SyGuS benchmarks☆25Sep 7, 2023Updated 2 years ago
- ☆14Nov 7, 2025Updated 4 months ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 10 years ago
- ☆16Jan 5, 2022Updated 4 years ago
- Java bindings for LLVM libraries☆31Jun 9, 2013Updated 12 years ago
- ☆10Sep 14, 2019Updated 6 years ago
- ☆16Mar 22, 2024Updated 2 years ago
- Mapping Language to Code in a Programmatic Context☆80Jan 27, 2021Updated 5 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Zipper data structure for Java☆14Sep 10, 2009Updated 16 years ago
- Static Program Analysis for Reliable Trusted Apps☆23Nov 29, 2018Updated 7 years ago
- PureMVC MultiCore Framework for PHP☆12Oct 27, 2018Updated 7 years ago
- An extension to the Java type system to catch badly-behaving builder patterns☆11Feb 13, 2023Updated 3 years ago
- ☆11May 8, 2019Updated 6 years ago
- Web based Gitolite Manager, written with node.js over express.js☆19Jul 23, 2011Updated 14 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- Euphony: a probabilistic model-guided program synthesizer☆27Nov 21, 2022Updated 3 years ago
- Example of how to catch USSD responses in Android☆10Dec 3, 2014Updated 11 years ago
- Provides a simpler approach to declaring and using AIDL objects for IPC on Android.☆13Aug 8, 2013Updated 12 years ago
- Basic Gradle configuration and example drivers to get started with WALA☆29Dec 2, 2024Updated last year
- Utilities for constructing a large dataset of LLVM IR☆25Jun 2, 2025Updated 9 months ago