0xjet / malsource
The malsource dataset
☆10Updated 3 years ago
Alternatives and similar repositories for malsource:
Users that are interested in malsource are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Dataset of packed ELF samples☆19Updated 2 years ago
- ☆15Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ☆68Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆22Updated 10 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆91Updated last month
- Diaphora Machine Learning tools and datasets☆20Updated 6 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 weeks ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- ☆77Updated last month
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 2 months ago
- Collection of slides☆33Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆17Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago