memcad
Memory analyzer
Analyzes C code for its memory layout and dependencies
The MemCAD static analyzer
25 stars
8 watching
5 forks
last commit: over 3 years ago
Linked from 1 awesome list
abstract-interpretationcocamlshape-analysisstatic-analysis
Related projects:
Repository | Description | Stars |
---|---|---|
maoni0/mem-doc | A resource for .NET memory analysis and diagnostics | 1,841 |
mumuki/mulang | Analyzes source code structure and syntax to detect potential issues and errors | 124 |
evild3ad/memprocfs-analyzer | Automated tool for forensic analysis of Windows memory dumps | 555 |
stcarrez/mat | A tool to analyze memory usage in programs | 7 |
rek7/mxtract | Analyzes and dumps memory to extract sensitive information from running processes | 582 |
naivesystems/analyze | Automates code security and compliance analysis for C++ projects. | 177 |
mbevilacqua/appcompatprocessor | An application compatibility data analysis tool designed to extract value beyond traditional techniques | 197 |
codacy/codacy-scalameta | A tool for static code analysis in Scala | 34 |
gleeda/memtriage | Analyze Windows machine RAM artifacts using Winpmem and Volatility | 218 |
nasa-sw-vnv/ikos | A static analysis tool for C/C++ programs based on Abstract Interpretation theory. | 2,746 |
mobileforensicsresearch/mem | Tool to dump memory from Android devices | 66 |
mbechler/serianalyzer | Analyzes Java bytecode to identify potential deserialization vulnerabilities. | 240 |
natebrune/fmem | A Linux kernel module designed to help analyze volatile memory without the limitations of traditional memory dumping tools. | 115 |
binaryanalysisplatform/bap | A comprehensive toolkit for analyzing and understanding binary programs | 2,079 |
usualsuspect/malscan | A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |