☆15Mar 13, 2021Updated 4 years ago
Alternatives and similar repositories for FIT
Users that are interested in FIT are comparing it to the libraries listed below
Sorting:
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- ☆14May 23, 2023Updated 2 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- ☆139Jun 15, 2018Updated 7 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 2 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- DC540 hacking challenge 0x00001.☆26Nov 26, 2025Updated 3 months ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Sep 4, 2015Updated 10 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 3 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- This project contains files for cyber security☆36Dec 17, 2018Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Hack to run the mssql-docker containers with a zfs filesystem mounted as data dir☆12May 28, 2019Updated 6 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆98Jun 17, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- ☆11Aug 21, 2024Updated last year
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated 2 months ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Oct 5, 2020Updated 5 years ago
- ☆12Oct 14, 2025Updated 4 months ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago