teamnsrg / outguardLinks
The data and data used in OutGuard
☆7Updated 5 years ago
Alternatives and similar repositories for outguard
Users that are interested in outguard are comparing it to the libraries listed below
Sorting:
- Tools used for MineSweeper project☆31Updated 4 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- ☆29Updated 3 years ago
- the repo for cmtracker☆21Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 6 years ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆85Updated 2 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆123Updated 2 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆66Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A Static Analysis Tool For Android Apps☆20Updated last week
- ☆23Updated last year
- JavaScript Transformation Techniques Detection☆10Updated 4 years ago
- ☆79Updated 3 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Identifying and Explaining Similarities in Android Apps☆27Updated 6 years ago
- A large dataset of real-world WebAssembly binaries, collected from the Web, GitHub, NPM and other sources. Useful as test data, to study …☆61Updated 2 years ago
- A System for Debloating C/C++ Programs☆31Updated 4 years ago
- ☆15Updated 2 years ago
- ☆82Updated 3 months ago
- Security methods for WeAkNess detection☆20Updated 4 months ago
- This repository contains several examples of logic bomb.☆107Updated last year
- ☆21Updated 5 years ago
- IoT Security Reading List☆63Updated 5 years ago
- ☆31Updated 2 years ago
- neural network assisted fuzzer☆407Updated 5 years ago
- ☆11Updated 3 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆27Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago