AndreaNaspi / WhiteRabbitTrackerLinks
WhiteRabbitTracker: Analyzing malware evasions with information flow tracking
☆17Updated 4 years ago
Alternatives and similar repositories for WhiteRabbitTracker
Users that are interested in WhiteRabbitTracker are comparing it to the libraries listed below
Sorting:
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- ☆25Updated 6 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆64Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆13Updated 2 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- ☆11Updated 6 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆12Updated 5 years ago
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Updated 5 years ago
- ☆44Updated 3 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆250Updated 2 weeks ago
- Automated Yara Rule generation using Biclustering☆75Updated last month
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- Collection of DBI evasion techniques☆16Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 5 months ago
- ☆58Updated 4 years ago
- Fuzz testing framework for binary programs using AI☆52Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- ☆147Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆58Updated 4 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago
- Awesome list for asm2vec☆17Updated 4 years ago