A Windows memory instrumentation tool to track memory allocations and deallocations for long-running applications.
☆14Jul 22, 2020Updated 5 years ago
Alternatives and similar repositories for LeakDetect
Users that are interested in LeakDetect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Nov 3, 2021Updated 4 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- Yolov11 Detector in simple PyTorch to make architecture more explicit and easy to work with. Based on `ultralytics` package☆11Nov 2, 2024Updated last year
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- 来源 于网上,高仿qq管家☆12Jul 2, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12May 6, 2020Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Sep 12, 2018Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Duilib 教程指南☆17Feb 1, 2021Updated 5 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Anti-Virus research on using Heuristics and GA's to evolve and detect new polymorphic virus signatures☆37May 5, 2014Updated 11 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- BLEU Score in Rust☆12Mar 1, 2026Updated 3 weeks ago
- ☆13Nov 14, 2023Updated 2 years ago
- 2020清华大学软件学院应用密码学大作业☆14Nov 15, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Nov 10, 2020Updated 5 years ago
- Achieve RSA4096 with C language☆15Oct 9, 2018Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆21Jun 22, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- INTEL PIN dbi based process tracer☆19Jun 25, 2020Updated 5 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- Code for ICASSP 2019 paper☆18Oct 29, 2018Updated 7 years ago
- ☆10Jan 10, 2026Updated 2 months ago
- ☆12Nov 6, 2017Updated 8 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago