FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)
☆17Jun 21, 2025Updated 8 months ago
Alternatives and similar repositories for FunProbe
Users that are interested in FunProbe are comparing it to the libraries listed below
Sorting:
- ☆23Aug 22, 2024Updated last year
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Mar 3, 2024Updated last year
- Supplementary Material for XFL☆19Nov 30, 2025Updated 2 months ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Aug 31, 2021Updated 4 years ago
- FirmSec Dataset☆46Oct 15, 2025Updated 4 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆72Sep 28, 2024Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆46Jun 5, 2025Updated 8 months ago
- Protocol state machine learner and fuzzer for DTLS servers and clients☆41Feb 20, 2026Updated last week
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver im…☆12Sep 16, 2019Updated 6 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- ☆20Jan 30, 2026Updated 3 weeks ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Expand -> Retrieve -> Rerank - simple method with strong results on BRIGHT benchmark☆22Aug 22, 2025Updated 6 months ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 2 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆88May 3, 2024Updated last year
- B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.☆446Updated this week
- 基于angr的污点分析引擎☆41Apr 19, 2019Updated 6 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Nov 9, 2022Updated 3 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- A Simple DLL Forward for Fucking IDA 9.0, which removed ida64.dll from beta3.☆14Sep 19, 2024Updated last year
- ☆11Mar 22, 2022Updated 3 years ago
- ☆30Oct 13, 2025Updated 4 months ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- TFA project for indirect call analysis☆10Mar 13, 2025Updated 11 months ago
- A frozen version of angr for the SAILR paper☆16Sep 4, 2024Updated last year
- Whale browser extension☆11Jan 31, 2026Updated 3 weeks ago