☆14May 23, 2023Updated 2 years ago
Alternatives and similar repositories for elf_similarity
Users that are interested in elf_similarity are comparing it to the libraries listed below
Sorting:
- ☆15Mar 13, 2021Updated 4 years ago
- ☆13Jun 3, 2020Updated 5 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- ☆36Jan 15, 2026Updated last month
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- 提取新闻、博客等长文本网页的正文工具☆42Feb 18, 2016Updated 10 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆26Feb 4, 2026Updated last month
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- 一个想让大家赚钱的数字货币量化项目☆12Oct 27, 2021Updated 4 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- 📗 Documents of Linux ELF binary signature verification solution.☆11Nov 30, 2020Updated 5 years ago
- Replication Package of "IoT Bugs and Development Challenges" study☆12Feb 20, 2021Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- ☆10Oct 2, 2017Updated 8 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- This is similar to GdrvLoader but it works on EAC (& BE but same for GdrvLoader) with included gdrv.sys (cert)☆32Dec 8, 2025Updated 2 months ago
- ZAST Express: Your Security Copilot in IDE.☆27Nov 28, 2025Updated 3 months ago
- Python-based proof-of-concept tool for generating payloads that utilize unsafe Java object deserialization.☆10Dec 6, 2021Updated 4 years ago
- Joy:一个捕获数据包、分析网络流量数据、网络研究取证及安全监控的工具☆43Oct 11, 2018Updated 7 years ago
- Bilateral Neural Network implementation in Tensorflow☆51Mar 23, 2019Updated 6 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Iot-vulhub 自建镜像版☆11May 1, 2022Updated 3 years ago