CymaticsCC / elf_similarityView external linksLinks
☆14May 23, 2023Updated 2 years ago
Alternatives and similar repositories for elf_similarity
Users that are interested in elf_similarity are comparing it to the libraries listed below
Sorting:
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆13Jun 3, 2020Updated 5 years ago
- ☆15Mar 13, 2021Updated 4 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 6 years ago
- CobaltStrikeDetect☆49Jun 19, 2025Updated 7 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评 论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 7 years ago
- 威胁情报采集系统☆33Dec 8, 2022Updated 3 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- ZAST Express: Your Security Copilot in IDE.☆27Nov 28, 2025Updated 2 months ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆11Apr 14, 2017Updated 8 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆10Oct 2, 2017Updated 8 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Python-based proof-of-concept tool for generating payloads that utilize unsafe Java object deserialization.☆10Dec 6, 2021Updated 4 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Joy:一个捕获数据包、分析网络流量数据、网络研究取证及安全监控的工具☆43Oct 11, 2018Updated 7 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 5 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- A GAN demo project☆12Jan 2, 2020Updated 6 years ago
- 二进制学习笔记☆12Oct 14, 2020Updated 5 years ago