Jiadosi / FITView external linksLinks
☆15Mar 13, 2021Updated 4 years ago
Alternatives and similar repositories for FIT
Users that are interested in FIT are comparing it to the libraries listed below
Sorting:
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- ☆14May 23, 2023Updated 2 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 2 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- DC540 hacking challenge 0x00001.☆26Nov 26, 2025Updated 2 months ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 2 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- This project contains files for cyber security☆36Dec 17, 2018Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Hack to run the mssql-docker containers with a zfs filesystem mounted as data dir☆12May 28, 2019Updated 6 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38May 10, 2018Updated 7 years ago
- ☆98Jun 17, 2024Updated last year
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Oct 5, 2020Updated 5 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- ☆13May 5, 2018Updated 7 years ago
- ☆16Feb 1, 2026Updated 2 weeks ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆18May 29, 2024Updated last year
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago