☆29Aug 7, 2025Updated 7 months ago
Alternatives and similar repositories for DeepType
Users that are interested in DeepType are comparing it to the libraries listed below
Sorting:
- TFA project for indirect call analysis☆12Mar 13, 2025Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 4 months ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 8 months ago
- tool of llm-based indirect-call analyzer☆30Feb 18, 2025Updated last year
- ☆35Feb 4, 2026Updated last month
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated 11 months ago
- SyzTrust's main repository. Start here to install.☆19Feb 29, 2024Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆37Jun 23, 2025Updated 8 months ago
- Static Cross-Entry UAF Detector☆24Apr 28, 2025Updated 10 months ago
- A Hybrid Alias Analysis☆19Aug 10, 2023Updated 2 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- american fuzzy lop - a security-oriented fuzzer☆11Feb 25, 2026Updated 3 weeks ago
- ☆16Jun 21, 2024Updated last year
- Apache Shiro CVE-2022-32532☆13Jun 28, 2022Updated 3 years ago
- DIVINE model checker git mirror, https://divine.fi.muni.cz. This is a read-only mirror of the main darcs repository. Issues should be rep…☆22Mar 21, 2021Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- A use-after-free checker based on SVF.☆20Nov 29, 2017Updated 8 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Formally verified x86-64 decompilation☆44Mar 9, 2026Updated last week
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆26Aug 22, 2024Updated last year
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 11 months ago
- Bug detection framework for finding Finger tracable bugs in Linux☆20Mar 23, 2025Updated 11 months ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Static analysis tool to detect missing and incorrect error checks in C and C++ codebases without using a priori knowledge.☆19Feb 11, 2026Updated last month
- ☆21Aug 25, 2024Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago