Forecasting Malware Capabilities From Cyber Attack Memory Images
☆34Jan 9, 2023Updated 3 years ago
Alternatives and similar repositories for Forecast
Users that are interested in Forecast are comparing it to the libraries listed below
Sorting:
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆26Feb 9, 2023Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 9 months ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- ☆17Mar 2, 2018Updated 8 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆21Feb 15, 2022Updated 4 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- ☆55Jan 7, 2024Updated 2 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- ☆22Jun 1, 2020Updated 5 years ago