程序分析大作业:使用 SOOT 框架,实现 Java 上的静态指针分析
☆37Aug 8, 2018Updated 7 years ago
Alternatives and similar repositories for ucas-hwk-pointer-analysis
Users that are interested in ucas-hwk-pointer-analysis are comparing it to the libraries listed below
Sorting:
- JAVA指针分析☆13Jul 23, 2019Updated 6 years ago
- A points-to and alias analysis benchmark suite☆41Sep 24, 2018Updated 7 years ago
- 西安电子科技大学本科生毕业设计( 论文)LaTeX模板☆11Jun 7, 2016Updated 9 years ago
- ☆26Feb 21, 2026Updated last week
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet☆54Sep 11, 2021Updated 4 years ago
- Java 设计模式梳理☆36Jun 20, 2022Updated 3 years ago
- ☆41Mar 10, 2021Updated 4 years ago
- Code similarity checker using clang.(AST approach)☆17Feb 17, 2017Updated 9 years ago
- solution to buggyLoader of 0CTF/TCTF 2021 Finals☆20Sep 27, 2021Updated 4 years ago
- java 漏洞平台包含各种CVE☆23Jun 17, 2022Updated 3 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- 中国大学MOOC-翁恺-C语言程序设计习题集☆15Feb 4, 2015Updated 11 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆68Dec 10, 2024Updated last year
- Flow analysis using Soot☆52Jun 12, 2020Updated 5 years ago
- Syclover(三叶草安全小组)承办的ctf比赛集合☆57May 31, 2017Updated 8 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- A benchmark to evaluate taint analysis☆28Jun 20, 2022Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Java library used to upload files following the security steps described by OWASP☆10Jun 7, 2021Updated 4 years ago
- c++简单爬虫,包含URL解析,广度优先搜索,文本解析,信息存储等所有基本模块☆10Apr 10, 2016Updated 9 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- Enables the extraction of Java AST nodes with plain JDT☆18Nov 10, 2017Updated 8 years ago
- A modification for Klei's Oxygen Not Included☆10Jun 9, 2022Updated 3 years ago
- Note taking app with cloud storage☆12May 24, 2020Updated 5 years ago
- A Picture Management software using MFC☆10Sep 16, 2013Updated 12 years ago
- Vision Based Inspection tool comprising of retrained Inception V3 network and OpenCV Filters for fracture detection. Published at A2IC 20…☆11Jun 19, 2019Updated 6 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- S&P2023 Paper☆39Aug 20, 2022Updated 3 years ago
- attackRmi☆258Oct 14, 2020Updated 5 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- 哈工大机器学习作业一——多项式拟合曲线☆10Oct 19, 2016Updated 9 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- 点阵笔轨迹录制☆11Dec 10, 2019Updated 6 years ago
- 哈尔滨工业大学 数据库系统(战神班) 实验 2022春☆11Sep 21, 2023Updated 2 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Json Pattern Validator☆10Nov 17, 2025Updated 3 months ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- ☆11Jan 6, 2020Updated 6 years ago