☆23Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for QTypist
Users that are interested in QTypist are comparing it to the libraries listed below
Sorting:
- ☆15Jan 24, 2023Updated 3 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- ☆16Feb 27, 2023Updated 3 years ago
- Python CLI and wrapper for the Mobile Security Framework (MobSF) REST-API☆17Feb 9, 2021Updated 5 years ago
- An automated and scalable approach to generate tasklets from a natural language task query and a website URL. Glider does not require any…☆28Sep 3, 2021Updated 4 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- ☆29Dec 11, 2024Updated last year
- ☆26Dec 27, 2025Updated 2 months ago
- An Intellij Plugin that generates unit test methods with meaningful names based in described behaviours with @should tags in methods ja…☆10Dec 14, 2025Updated 2 months ago
- Scape firmware metadata from 18 vendors and download corresponding firmware images. Save in MySQL database for InfoSec research purposes.☆12Feb 17, 2023Updated 3 years ago
- DeepDi: A Fast and Accurate Disassembler for Binary Code AI☆101May 6, 2023Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Apr 13, 2022Updated 3 years ago
- Python bindings for libsrcml☆17Aug 25, 2025Updated 6 months ago
- Chrome Extension for visualizing browsing history☆11Sep 6, 2023Updated 2 years ago
- GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs☆14Jan 5, 2026Updated last month
- VS Code extension that recommends using the Windows Subsystem for Linux (WSL) and the Remote WSL extension.☆11Updated this week
- List of subdomain and dynamic DNS providers☆10Dec 11, 2025Updated 2 months ago
- ☆49Jun 12, 2025Updated 8 months ago
- ☆11Jul 20, 2021Updated 4 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- LLM-powered tool that enhances OpenAPI specifications by extracting machine-readable constraints from human-readable descriptions.☆14Nov 6, 2024Updated last year
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆14Jan 3, 2025Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- Generator and Internet Draft (I-D) documenting test vectors for the stream cipher ChaCha.☆12Apr 21, 2016Updated 9 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- ☆14Mar 10, 2025Updated 11 months ago
- ☆12Apr 21, 2024Updated last year
- ☆16Sep 7, 2021Updated 4 years ago
- lyo.designer☆16Updated this week
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Stuff related to scraping the Code Review StackExchange☆12Jan 19, 2023Updated 3 years ago
- ☆14Mar 9, 2025Updated 11 months ago
- ☆12Nov 2, 2025Updated 3 months ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆10May 5, 2021Updated 4 years ago
- Artifact repository for the paper "Perfect Is the Enemy of Test Oracle", In Proceedings of The 30th ACM Joint European Software Engineeri…☆11May 4, 2023Updated 2 years ago