NMHai / BE-PUMLinks
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆19Updated 7 years ago
Alternatives and similar repositories for BE-PUM
Users that are interested in BE-PUM are comparing it to the libraries listed below
Sorting:
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆56Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 6 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 7 months ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- ROPChain generator.☆40Updated 6 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆52Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- ☆31Updated 4 years ago
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆28Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆27Updated last year
- Evaluating function diffing existing techniques☆12Updated 6 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago