BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆20Dec 25, 2017Updated 8 years ago
Alternatives and similar repositories for BE-PUM
Users that are interested in BE-PUM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- PoC LibVMI-based GDB server for virtual machines☆54Dec 13, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The C3, SMT/SAT solver written in C.☆35Aug 10, 2025Updated 8 months ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated 2 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 8 months ago
- ☆16Oct 4, 2012Updated 13 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- gdbserver implementation on BitVisor☆24Nov 8, 2017Updated 8 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- https://github.com/sk2sat/emu のほうで一から作り直ししてます☆24Jul 8, 2017Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆40Aug 2, 2022Updated 3 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆135Jan 6, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆69Nov 19, 2024Updated last year
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- A Multithread PcapNG capturing tool with Hardware timestamping☆10Nov 6, 2016Updated 9 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- Counter-example guided inductive synthesis (CEGIS) implementation for the SMT solver Z3 by Microsoft Research☆62Jan 8, 2017Updated 9 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50May 21, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Inject a Dll from memory☆44Sep 10, 2019Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- 論文を読んだふりしてライバルに差をつけろ☆17Dec 31, 2016Updated 9 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆58Sep 2, 2021Updated 4 years ago
- Code snippets for Binary Ninja's Python API☆35Jun 2, 2021Updated 4 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Windows API tracer for malware (oldname: unitracer)☆119Oct 16, 2017Updated 8 years ago