☆14Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for mindsight_cfg2vec
Users that are interested in mindsight_cfg2vec are comparing it to the libraries listed below
Sorting:
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- Supplementary Material for XFL☆19Nov 30, 2025Updated 3 months ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Feb 25, 2026Updated last week
- Enumerate your Kubernetes cluster with just 1 command☆11Feb 25, 2026Updated last week
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆46Jun 5, 2025Updated 8 months ago
- Evolutionary decision trees☆11Jun 16, 2025Updated 8 months ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- paper爬取+多agent分析(Polaris)☆26Updated this week
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆11Nov 17, 2023Updated 2 years ago
- ☆16Dec 1, 2024Updated last year
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- cv-warpPolar-exampleは、OpenCVでの極座標変換/逆変換の実行例です。☆11Jul 11, 2020Updated 5 years ago
- An MCP-based agent to route pr reviews to coding agents☆15Sep 18, 2025Updated 5 months ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆17Jun 21, 2025Updated 8 months ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Code and resources for the paper: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs"☆211May 10, 2021Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Jan 2, 2025Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- This repo supports integrating LLMs and communication algorithms with MARL using SMAC as the platform. It provides an end-to-end workflow…☆16Mar 8, 2025Updated 11 months ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- ☆61Dec 5, 2024Updated last year
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆17Oct 17, 2022Updated 3 years ago