AdaLogics / pandaMalboxLinks
☆12Updated 6 years ago
Alternatives and similar repositories for pandaMalbox
Users that are interested in pandaMalbox are comparing it to the libraries listed below
Sorting:
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 8 years ago
- ☆12Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ☆26Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆21Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 7 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 5 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- ☆82Updated 4 years ago
- ☆12Updated 4 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- ☆19Updated 3 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆20Updated 5 years ago
- ghidra scripts☆15Updated 5 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- ☆25Updated 6 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Updated 3 years ago
- Repo for fuzzing projects☆46Updated 5 years ago