Showing 2 open source projects for "duplicate code detect"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    AppShark

    AppShark

    Static taint analysis platform to scan vulnerabilities

    AppShark is an open-source static taint-analysis platform developed by ByteDance designed to scan Android application packages (APKs) for potential security or privacy vulnerabilities. It performs code analysis without executing the app — inspecting APK contents, tracking data flows (taints), and detecting risky patterns such as insecure file access, unsafe API usage, resource-leak possibilities, or misconfigurations. Users can customize scanning via rule sets (written in JSON), defining which types of vulnerabilities or compliance issues to detect — making AppShark flexible and adaptable to different security policies or threat models. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MemoryLeakDetector

    MemoryLeakDetector

    Native memory leak monitoring tool

    memory-leak-detector is a native memory-leak monitoring tool developed by ByteDance (originally for their video-app team) that helps developers detect, diagnose, and manage memory leaks in native (e.g. C/C++) code across Android applications. It offers relatively simple integration and wide monitoring coverage: by configuring the tool (or via broadcast control), developers can start leak detection for specific native libraries or entire processes. Upon activation, it tracks allocations / memory maps, logs usage, and outputs reports that can be post-processed (e.g. via provided Python scripts) to list potential leak suspects — assisting in identifying leaks that traditional tools might miss. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next