☆29Aug 7, 2025Updated 8 months ago
Alternatives and similar repositories for DeepType
Users that are interested in DeepType are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TFA project for indirect call analysis☆13Mar 13, 2025Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 5 months ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆20Jun 7, 2025Updated 10 months ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 9 months ago
- tool of llm-based indirect-call analyzer☆30Feb 18, 2025Updated last year
- ☆36Feb 4, 2026Updated 2 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- Linux kernel branches for confidential compute research☆20Updated this week
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆37Jun 23, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Static Cross-Entry UAF Detector☆25Apr 28, 2025Updated 11 months ago
- A Hybrid Alias Analysis☆19Aug 10, 2023Updated 2 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- american fuzzy lop - a security-oriented fuzzer☆11Feb 25, 2026Updated last month
- ☆16Jun 21, 2024Updated last year
- DIVINE model checker git mirror, https://divine.fi.muni.cz. This is a read-only mirror of the main darcs repository. Issues should be rep…☆22Mar 21, 2021Updated 5 years ago
- ☆21Nov 14, 2024Updated last year
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆17Jan 1, 2021Updated 5 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Formally verified x86-64 decompilation☆45Mar 19, 2026Updated 3 weeks ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆26Aug 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Bug detection framework for finding Finger tracable bugs in Linux☆20Mar 23, 2025Updated last year
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated last year
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Static analysis tool to detect missing and incorrect error checks in C and C++ codebases without using a priori knowledge.☆19Feb 11, 2026Updated last month
- ☆21Aug 25, 2024Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago