AndreaNaspi / WhiteRabbitTrackerView external linksLinks
WhiteRabbitTracker: Analyzing malware evasions with information flow tracking
☆18Jul 25, 2021Updated 4 years ago
Alternatives and similar repositories for WhiteRabbitTracker
Users that are interested in WhiteRabbitTracker are comparing it to the libraries listed below
Sorting:
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- static taint analysis of hybrid Android Apps (Java + HTML)☆13Jan 9, 2022Updated 4 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆24Dec 8, 2021Updated 4 years ago
- ☆63Apr 1, 2021Updated 4 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27May 10, 2019Updated 6 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- A python program used to gain access to computers running Secure Shell via dictionary attack.☆11Nov 20, 2017Updated 8 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- SLE course at University of Groningen☆10Jan 23, 2024Updated 2 years ago
- ☆11Jun 19, 2018Updated 7 years ago
- smart contracts deployed on Ethereum, one per skeleton☆11Mar 10, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- Research papers on ML for security☆35Jul 23, 2020Updated 5 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆28Apr 14, 2023Updated 2 years ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago