☆86Nov 5, 2024Updated last year
Alternatives and similar repositories for XDA
Users that are interested in XDA are comparing it to the libraries listed below
Sorting:
- ☆106Oct 23, 2024Updated last year
- ☆61Dec 5, 2024Updated last year
- ☆27Aug 28, 2024Updated last year
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- ☆145Oct 26, 2024Updated last year
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- BinTuner☆67Jul 25, 2022Updated 3 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- The official repo for GCP-CROWN paper☆13Sep 26, 2022Updated 3 years ago
- Code for paper "Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers"☆17Jan 27, 2023Updated 3 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 8 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆180Apr 10, 2025Updated 11 months ago
- ☆15Dec 29, 2023Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- Official repository for DeepBinDiff☆250Dec 7, 2021Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- ☆139Jun 15, 2018Updated 7 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Get results of binaryai.cn using our SDK☆507Feb 9, 2026Updated last month
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆122Feb 25, 2026Updated 3 weeks ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 2 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 2 years ago
- GitHub Cloner & Compiler☆75Sep 24, 2021Updated 4 years ago