#
runtime-analysis
Here are 7 public repositories matching this topic...
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
static-analysis
mobile-app
android-application
ios-app
dynamic-analysis
pentesting
reverse-engineers
network-analysis
runtime-analysis
-
Updated
Aug 30, 2020
Hand-crafted Frida examples
android
java
ios
objective-c
reverse-engineering
instrumentation
dynamic-analysis
java-native-interface
arm64
mobile-security
frida
aarch64
hooking
runtime-analysis
-
Updated
Sep 4, 2020 - JavaScript
A platform for running codemods based on runtime information
-
Updated
Jan 10, 2019 - TypeScript
ruby
python
c
java
c-plus-plus
haskell
performance
quicksort
mergesort
insertion-sort
sorting-algorithms
selection-sort
heapsort
runtime-analysis
-
Updated
Sep 16, 2019 - Java
This simple javascript based webpage allows users to analyse the runtime of different functions using the console logs
javascript
api
console
aws
gui
performance
aws-lambda
simple
tool
async
interactive
logging
cloudwatch
async-functions
asynchronous-programming
performance-analysis
async-await
diy-solutions
runtime-analysis
runtime-performance-analysis
-
Updated
Mar 28, 2020 - JavaScript
For a Cabal package, combine a call graph traversal and cost center stacks from GHC executing its dependents to understand how packages are used in the wild
-
Updated
Oct 1, 2020 - Haskell
Improve this page
Add a description, image, and links to the runtime-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the runtime-analysis topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ