NMHai / BE-PUMLinks
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆20Updated 7 years ago
Alternatives and similar repositories for BE-PUM
Users that are interested in BE-PUM are comparing it to the libraries listed below
Sorting:
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆72Updated last year
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ROPChain generator.☆40Updated 7 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 6 years ago
- A function tracer☆92Updated 6 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Updated 8 years ago
- ☆50Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago