FirmSec Dataset
☆46Oct 15, 2025Updated 5 months ago
Alternatives and similar repositories for FirmSecDataset
Users that are interested in FirmSecDataset are comparing it to the libraries listed below
Sorting:
- Docker container with all extra tools installed to get the most out of binwalk☆20Dec 17, 2020Updated 5 years ago
- ☆66Jun 21, 2024Updated last year
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 2 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆18Jun 21, 2025Updated 8 months ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- ☆32Jul 22, 2023Updated 2 years ago
- ☆96May 4, 2025Updated 10 months ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆180Apr 10, 2025Updated 11 months ago
- Supplementary Material for XFL☆20Nov 30, 2025Updated 3 months ago
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆17Aug 9, 2024Updated last year
- ☆23Jun 22, 2024Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- ☆73Nov 1, 2023Updated 2 years ago
- ☆20Aug 20, 2025Updated 7 months ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- Code for tracelet-level symbolic execution☆18Sep 18, 2022Updated 3 years ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆19Apr 9, 2019Updated 6 years ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- ☆16Sep 16, 2021Updated 4 years ago
- Public version of CNEPS☆24Dec 30, 2024Updated last year
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆29May 7, 2024Updated last year
- Simulate firmware with one click of firmadyne (使用 firmadyne 一键模拟固件)☆367Aug 18, 2024Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 8 months ago
- ☆11Mar 22, 2022Updated 3 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 6 years ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Mar 3, 2024Updated 2 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Repository for monolithic firmware blobs☆89Mar 10, 2022Updated 4 years ago
- ☆18Aug 31, 2014Updated 11 years ago
- ☆47May 27, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- An awesome & curated list of binary code similarity papers☆601Jan 5, 2026Updated 2 months ago
- Source code for LLMxCPG paper☆125Feb 10, 2026Updated last month