testing661 / QTypistLinks
☆23Updated 2 years ago
Alternatives and similar repositories for QTypist
Users that are interested in QTypist are comparing it to the libraries listed below
Sorting:
- Mobile App Analysis and Testing Literature☆96Updated 3 weeks ago
- ☆25Updated 4 years ago
- Stoat (STochastic model App Tester) - an automatic testing tool for android apps☆152Updated 2 years ago
- The Themis Benchmark for evaluating automated GUI testing☆154Updated last year
- ☆38Updated last year
- ☆55Updated 4 years ago
- ☆145Updated 4 months ago
- ☆58Updated last year
- DroidMate-2: A Platform for Android Test Generation☆29Updated 4 years ago
- ☆14Updated 2 years ago
- ☆20Updated 2 years ago
- Fair Android Explorer☆21Updated 2 years ago
- ☆18Updated 2 years ago
- ☆74Updated 2 years ago
- An android bug reproduce tool☆23Updated 3 years ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆40Updated last year
- Defect Library for LLM-enabled Software☆22Updated 2 weeks ago
- ☆15Updated 3 years ago
- Automated Storyboard Generation for Android Apps☆34Updated 11 months ago
- This repository holds the data and code for the AndroR2 dataset of manually-reproduced bug reports for Android apps☆25Updated 4 years ago
- AutoPruner: Transformer-based Call Graph Pruning (ESEC/FSE 2022, Research Track)☆22Updated last year
- ☆24Updated 4 years ago
- ☆16Updated last year
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆37Updated 3 years ago
- ☆16Updated 2 years ago
- A database of crash (exception) bugs for Android apps☆21Updated last year
- ☆88Updated 2 years ago
- EHBDroid is an effective and efficient Android Testing tool based on the idea of "event-handler-based" testing. Please cite the followi…☆19Updated 6 years ago
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆39Updated last year
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆41Updated last year