NMHai / BE-PUM
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆17Updated 7 years ago
Alternatives and similar repositories for BE-PUM:
Users that are interested in BE-PUM are comparing it to the libraries listed below
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 5 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆26Updated 10 months ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- AllMemPro☆43Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 6 years ago
- ☆14Updated 7 years ago
- Evaluating function diffing existing techniques☆11Updated 5 years ago
- Convolutional Recurrent Neural Net based malware detection model☆9Updated 4 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆30Updated 4 years ago
- FunSeeker: Binary Function Identification Tool☆24Updated last year
- suite of binaries used to test function identification☆28Updated 7 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆22Updated 2 months ago
- ☆30Updated 4 years ago