0xjet / malsourceLinks
The malsource dataset
☆12Updated 4 years ago
Alternatives and similar repositories for malsource
Users that are interested in malsource are comparing it to the libraries listed below
Sorting:
- ☆26Updated 2 years ago
- My conference presentations and Materials for them.☆33Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last month
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 10 months ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- My scripts to deobfuscate APT32 malware☆27Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Updated 3 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆61Updated last week
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆38Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last month
- ☆80Updated 10 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- A library for patching ELFs☆61Updated 5 years ago
- a list of web browser vulnerabilities☆20Updated 5 years ago
- ☆28Updated 3 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- ☆36Updated 5 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago