suminb / winnowingLinks
A Python implementation of the Winnowing (local algorithms for document fingerprinting)
☆54Updated 5 years ago
Alternatives and similar repositories for winnowing
Users that are interested in winnowing are comparing it to the libraries listed below
Sorting:
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- Programmer De-anonymization via Code Stylometry☆78Updated 8 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- Python wrapper for ssdeep fuzzy hashing library☆152Updated 3 years ago
- Probabilistic API Mining☆53Updated 7 years ago
- neural network assisted fuzzer☆408Updated 5 years ago
- ☆146Updated 2 years ago
- similarity digest hashing tool☆172Updated 4 years ago
- ☆20Updated 8 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆178Updated 2 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 7 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆406Updated 2 months ago
- DeepBugs is a framework for learning bug detectors from an existing code corpus.☆151Updated 4 years ago
- ☆59Updated 10 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Updated 9 years ago
- An inter-procedural data-flow analysis framework using value-based context sensitivity☆91Updated last year
- Neural Variable Renaming for Decompiled Binaries☆44Updated 5 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Updated 7 years ago
- Sourcerer's Code Clone project☆217Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆43Updated last year
- American Fuzzy Lop fork server and instrumentation for pure-Python code☆370Updated 5 months ago
- ANTLR 3 fuzzy parser☆49Updated 12 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- Source code understanding via Machine Learning techniques☆137Updated 2 years ago
- Some C++ example code to demonstrate how to perform code similarity searches using SimHashing.☆563Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆325Updated 7 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- An Automated Vulnerability Detection System☆60Updated 9 years ago
- Home page for this github organization☆22Updated 7 years ago