Lancern / asm2vec
An unofficial implementation of asm2vec as a standalone python package
☆163Updated 4 years ago
Alternatives and similar repositories for asm2vec:
Users that are interested in asm2vec are comparing it to the libraries listed below
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆80Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆147Updated last year
- ☆274Updated 7 months ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆103Updated 6 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆175Updated last year
- Official repository for DeepBinDiff☆234Updated 3 years ago
- ☆60Updated last year
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆37Updated last year
- ☆96Updated 5 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆120Updated 2 years ago
- ☆143Updated 4 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆250Updated last month
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- Offical Implementation for PalmTree☆141Updated last year
- Symbolic Execution Over Processor Traces☆119Updated 7 months ago
- ☆224Updated last year
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Updated 2 years ago
- ☆135Updated 6 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆154Updated 2 years ago
- The scalable bug search for binaries☆68Updated 8 years ago
- Full implementaion of Genius☆31Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆86Updated 2 months ago
- This is the official repository for VulHawk.☆69Updated last year
- ☆83Updated 4 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆156Updated 4 months ago
- A set of programs used for benchmarking the strength of obfuscation☆87Updated 7 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆75Updated last year
- ☆44Updated 2 years ago
- ☆22Updated last year