#sourcecodeanalysis search results

Day 26/100: Evaluating Eclipse PMD plug-in for source code analysis, what can help us to code better. #SourceCodeAnalysis #codeanalysis #100DaysOfCode

masreis's tweet image. Day 26/100:
Evaluating Eclipse PMD plug-in for source code analysis, what can help us to code better.
#SourceCodeAnalysis #codeanalysis #100DaysOfCode

Ever wonder how frequently different C/C++ token types are used? Wonder no more! #SemiUsefulVisualizations #SourceCodeAnalysis

realDanGrahn's tweet image. Ever wonder how frequently different C/C++ token types are used? Wonder no more!

#SemiUsefulVisualizations #SourceCodeAnalysis

Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not? معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك آمن أم لا ؟ #sourcecodeanalysis #programmers

ItCapside's tweet image. Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not?

معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك  آمن أم لا ؟

#sourcecodeanalysis #programmers

Looking for #SecuritySolution that applies #SourceCodeAnalysis algorithm for maximumAccuracy?bit.ly/1TKkEge

SumaSoftPvtLtd's tweet image. Looking for #SecuritySolution that applies #SourceCodeAnalysis algorithm for maximumAccuracy?bit.ly/1TKkEge

@SumaSoftPvtLtd explains why #SourceCodeAnalysis is one of the most preferred security measures. Read More - ow.ly/ON2Z30bwQwa

SumaSoftPvtLtd's tweet image. @SumaSoftPvtLtd explains why #SourceCodeAnalysis is one of the most preferred security measures. Read More - ow.ly/ON2Z30bwQwa

🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 🌐bit.ly/3kuavyN #TechSecurity

whitenetio's tweet image. 🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 
🌐bit.ly/3kuavyN

#TechSecurity

Discover how a leading bank uses #sourcecodeanalysis to strengthen security chkmrx.co/2F4JQSI (PDF)

Checkmarx's tweet image. Discover how a leading bank uses #sourcecodeanalysis to strengthen security chkmrx.co/2F4JQSI (PDF)

I'm hooked on source code analysis! 😄✨ I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 Check it out below ⬇️ github.com/Ayato-kosaka/s… #SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

neighborteacher's tweet image. I'm hooked on source code analysis! 😄✨ 
I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 
Check it out below ⬇️
github.com/Ayato-kosaka/s…

#SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

67% of commercial apps have vulnerabilities. Does yours? Let Suma Soft do a source code analysis for you #appsecurity #sourcecodeanalysis - ow.ly/o6RJ30jdkge

SumaSoftPvtLtd's tweet image. 67% of commercial apps have vulnerabilities. Does yours? Let Suma Soft do a source code analysis for you #appsecurity #sourcecodeanalysis - ow.ly/o6RJ30jdkge

#ThursdayThoughts 5 Benefits of Secure Source Code Analysis for Businesses- goo.gl/ZRGYkR #CyberSecurity #SourceCodeAnalysis

SumaSoftPvtLtd's tweet image. #ThursdayThoughts
5 Benefits of Secure Source Code Analysis for Businesses- goo.gl/ZRGYkR  #CyberSecurity #SourceCodeAnalysis

Is your application using 3rd party components? Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with @Kiuwan Insights. Get the data sheet: #sca #sourcecodeanalysis #codesecurity buff.ly/3rRwKOx

ServeCorr's tweet image. Is your application using 3rd party components? Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with @Kiuwan Insights. Get the data sheet: #sca #sourcecodeanalysis #codesecurity
buff.ly/3rRwKOx

Reservoir's R-Check SCA tool is used by #DoD's JTNC to verify radio waveforms. Our partner NordiaSoft has a white paper on SCA. R-Check SCA: reservoir.com/product/r-chec… SCA white paper: nordiasoft.com/knowledge-cent… #softwaredefinedradio #sourcecodeanalysis

Reservoir_Labs's tweet image. Reservoir's R-Check SCA tool is used by #DoD's JTNC to verify radio waveforms. Our partner NordiaSoft has a white paper on SCA.

R-Check SCA: reservoir.com/product/r-chec…

SCA white paper: nordiasoft.com/knowledge-cent… 

#softwaredefinedradio #sourcecodeanalysis

Myslíme za vás. (Ale jenom někdy...) #sourceCodeAnalysis


Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis Here are three ways you can stay secure on MMO games online: t.ly/2bVTt

leansecurityau's tweet image. Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis
Here are three ways you can stay secure on MMO games online:

t.ly/2bVTt

In our latest series, you'll identify different ways a stack overflow vulnerability can be present in source code and prove that they can be used to exploit a program. Don't have a license? Book a demo👉 hubs.ly/Q016fxXw0 #redteam #sourcecodeanalysis #stackoverflow

immersivelabs's tweet image. In our latest series, you'll identify different ways a stack overflow vulnerability can be present in source code and prove that they can be used to exploit a program.
Don't have a license? Book a demo👉 hubs.ly/Q016fxXw0
#redteam #sourcecodeanalysis #stackoverflow

The Repeat Offenders: Characterizing and Predicting Extremely Bug-Prone Source Methods. arxiv.org/abs/2511.22726


if you want to go deeper into source code review, check out the book: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities


2. Compiler Design 🎬 Source Code (2011) ➡ Shows layers of execution, abstraction, and interpretation like a program runtime. youtu.be/1HCsSOuDS7Y?si…

LogicalNil's tweet card. SOURCE CODE - Trailer - Starring Jake Gyllenhaal

youtube.com

YouTube

SOURCE CODE - Trailer - Starring Jake Gyllenhaal


3/8 18 Advanced Analysis Options including: Hidden string extraction from packed regions Entry point analysis to find real malicious code Entropy visualization for packed vs unpacked areas Anti-analysis technique detection (debuggers, VMs, sandboxes) #DigitalForensics #RE


static code analysis for finding bugs and enforcing code standards across 30+ languages

tom_doerr's tweet image. static code analysis for finding bugs and enforcing code standards across 30+ languages

👨‍🔧 Github: open-source codebase analysis tool that generates high-level diagram representations of codebases using static analysis and LLM agents, that humans and agents can interact with. Extract modules and their relationships based on the control flow graph of the project.…

rohanpaul_ai's tweet image. 👨‍🔧 Github: open-source codebase analysis tool that generates high-level diagram representations of codebases using static analysis and LLM agents, that humans and agents can interact with.

Extract modules and their relationships based on the control flow graph of the project.…

Want to learn how to discover the root cause of recently patched OSS vulnerabilities and find some more to report? #SourceCodeAnalysis #BSidesDE buff.ly/48EFJb5


🚀 Dive into the Source Code Analysis series of Apache SeaTunnel Zeta Engine by Apache SeaTunnel! Gain insights from three articles for a deeper understanding when using SeaTunnel. #Apache #SeaTunnel #SourceCodeAnalysis 🚀 ift.tt/TIzo3On


always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints 🌹🥰🥳 #bugbountytip #bugbounty

ynsmroztas's tweet image. always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA

from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints 🌹🥰🥳

#bugbountytip #bugbounty…

Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis Here are three ways you can stay secure on MMO games online: t.ly/2bVTt

leansecurityau's tweet image. Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis
Here are three ways you can stay secure on MMO games online:

t.ly/2bVTt

🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 🌐bit.ly/3kuavyN #TechSecurity

whitenetio's tweet image. 🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 
🌐bit.ly/3kuavyN

#TechSecurity

👉 Machine Learning on Source Code A curated list of awesome research papers, datasets and software projects devoted to machine learning and source code. 🔗 github.com/src-d/awesome-…

DanKornas's tweet image. 👉 Machine Learning on Source Code
 
A curated list of awesome research papers, datasets and software projects devoted to machine learning and source code.

🔗 github.com/src-d/awesome-…

👉 Machine Learning on Source Code A curated list of awesome research papers, datasets and software projects devoted to machine learning and source code. 🔗 github.com/src-d/awesome-…

DanKornas's tweet image. 👉 Machine Learning on Source Code
 
A curated list of awesome research papers, datasets and software projects devoted to machine learning and source code.

🔗 github.com/src-d/awesome-…

I'm hooked on source code analysis! 😄✨ I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 Check it out below ⬇️ github.com/Ayato-kosaka/s… #SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

neighborteacher's tweet image. I'm hooked on source code analysis! 😄✨ 
I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 
Check it out below ⬇️
github.com/Ayato-kosaka/s…

#SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

Password Decryption due to Sensitive Data Exposure in Front End Source Code dlvr.it/SZptg2 #cybersecurity #sourcecodeanalysis #sensitivedata


Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not? معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك آمن أم لا ؟ #sourcecodeanalysis #programmers

ItCapside's tweet image. Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not?

معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك  آمن أم لا ؟

#sourcecodeanalysis #programmers

Day 26/100: Evaluating Eclipse PMD plug-in for source code analysis, what can help us to code better. #SourceCodeAnalysis #codeanalysis #100DaysOfCode

masreis's tweet image. Day 26/100:
Evaluating Eclipse PMD plug-in for source code analysis, what can help us to code better.
#SourceCodeAnalysis #codeanalysis #100DaysOfCode

Ever wonder how frequently different C/C++ token types are used? Wonder no more! #SemiUsefulVisualizations #SourceCodeAnalysis

realDanGrahn's tweet image. Ever wonder how frequently different C/C++ token types are used? Wonder no more!

#SemiUsefulVisualizations #SourceCodeAnalysis

Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not? معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك آمن أم لا ؟ #sourcecodeanalysis #programmers

ItCapside's tweet image. Most breaches occur due to weak protection in software and systems within organizations. Is your source code safe or not?

معظم الأختراقات تحدث بسبب ضعف الحمايه في البرمجيات والأنظمه داخل المؤسسات. هل الكود المصدري الخاص بك  آمن أم لا ؟

#sourcecodeanalysis #programmers

Looking for #SecuritySolution that applies #SourceCodeAnalysis algorithm for maximumAccuracy?bit.ly/1TKkEge

SumaSoftPvtLtd's tweet image. Looking for #SecuritySolution that applies #SourceCodeAnalysis algorithm for maximumAccuracy?bit.ly/1TKkEge

Discover how a leading bank uses #sourcecodeanalysis to strengthen security chkmrx.co/2F4JQSI (PDF)

Checkmarx's tweet image. Discover how a leading bank uses #sourcecodeanalysis to strengthen security chkmrx.co/2F4JQSI (PDF)

@SumaSoftPvtLtd explains why #SourceCodeAnalysis is one of the most preferred security measures. Read More - ow.ly/ON2Z30bwQwa

SumaSoftPvtLtd's tweet image. @SumaSoftPvtLtd explains why #SourceCodeAnalysis is one of the most preferred security measures. Read More - ow.ly/ON2Z30bwQwa

I'm hooked on source code analysis! 😄✨ I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 Check it out below ⬇️ github.com/Ayato-kosaka/s… #SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

neighborteacher's tweet image. I'm hooked on source code analysis! 😄✨ 
I've created code to extract the locations where specific methods are called, imported from a specified module! 🔍💻 
Check it out below ⬇️
github.com/Ayato-kosaka/s…

#SourceCodeAnalysis #TypeScript #Programming #CodeAnalysis #Development

🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 🌐bit.ly/3kuavyN #TechSecurity

whitenetio's tweet image. 🔍 Secure code review is crucial for identifying vulnerabilities in applications! Whether manual or automated, it plays a vital role in ensuring robust cybersecurity. Enhance your defenses with thorough #SourceCodeAnalysis & #Pentesting. 
🌐bit.ly/3kuavyN

#TechSecurity

#ThursdayThoughts 5 Benefits of Secure Source Code Analysis for Businesses- goo.gl/ZRGYkR #CyberSecurity #SourceCodeAnalysis

SumaSoftPvtLtd's tweet image. #ThursdayThoughts
5 Benefits of Secure Source Code Analysis for Businesses- goo.gl/ZRGYkR  #CyberSecurity #SourceCodeAnalysis

Reservoir's R-Check SCA tool is used by #DoD's JTNC to verify radio waveforms. Our partner NordiaSoft has a white paper on SCA. R-Check SCA: reservoir.com/product/r-chec… SCA white paper: nordiasoft.com/knowledge-cent… #softwaredefinedradio #sourcecodeanalysis

Reservoir_Labs's tweet image. Reservoir's R-Check SCA tool is used by #DoD's JTNC to verify radio waveforms. Our partner NordiaSoft has a white paper on SCA.

R-Check SCA: reservoir.com/product/r-chec…

SCA white paper: nordiasoft.com/knowledge-cent… 

#softwaredefinedradio #sourcecodeanalysis

67% of commercial apps have vulnerabilities. Does yours? Let Suma Soft do a source code analysis for you #appsecurity #sourcecodeanalysis - ow.ly/o6RJ30jdkge

SumaSoftPvtLtd's tweet image. 67% of commercial apps have vulnerabilities. Does yours? Let Suma Soft do a source code analysis for you #appsecurity #sourcecodeanalysis - ow.ly/o6RJ30jdkge

In our latest series, you'll identify different ways a stack overflow vulnerability can be present in source code and prove that they can be used to exploit a program. Don't have a license? Book a demo👉 hubs.ly/Q016fxXw0 #redteam #sourcecodeanalysis #stackoverflow

immersivelabs's tweet image. In our latest series, you'll identify different ways a stack overflow vulnerability can be present in source code and prove that they can be used to exploit a program.
Don't have a license? Book a demo👉 hubs.ly/Q016fxXw0
#redteam #sourcecodeanalysis #stackoverflow

Is your application using 3rd party components? Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with @Kiuwan Insights. Get the data sheet: #sca #sourcecodeanalysis #codesecurity buff.ly/3rRwKOx

ServeCorr's tweet image. Is your application using 3rd party components? Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with @Kiuwan Insights. Get the data sheet: #sca #sourcecodeanalysis #codesecurity
buff.ly/3rRwKOx

Is your application using 3rd party components?  Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with Kiuwan Insights.  Get the data sheet: kiuwan.com/wp-content/upl… #sca #sourcecodeanalysis #codesecurity

Kiuwan's tweet image. Is your application using 3rd party components? 

Reduce risk from third-party components, remediate vulnerabilities and ensure license compliance with Kiuwan Insights. 

Get the data sheet: kiuwan.com/wp-content/upl…

#sca #sourcecodeanalysis #codesecurity

Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis Here are three ways you can stay secure on MMO games online: t.ly/2bVTt

leansecurityau's tweet image. Source code analysis is not just for developers—it's a crucial part of your security strategy. Let Lean Security find and fix vulnerabilities at the code level. #CodeSecurity #SourceCodeAnalysis
Here are three ways you can stay secure on MMO games online:

t.ly/2bVTt

Loading...

Something went wrong.


Something went wrong.


United States Trends