☆50Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for FICS
Users that are interested in FICS are comparing it to the libraries listed below
Sorting:
- Source code of MEUZZ fuzzer☆46Dec 11, 2021Updated 4 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- ☆43Jul 6, 2023Updated 2 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- ☆308Jul 30, 2024Updated last year
- ☆139Jun 15, 2018Updated 7 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- source code for savior fuzzer☆127Oct 1, 2020Updated 5 years ago
- An awesome & curated list of binary code similarity papers☆601Jan 5, 2026Updated 2 months ago
- ☆18Mar 18, 2024Updated 2 years ago
- ☆17Jun 10, 2020Updated 5 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- Get results of binaryai.cn using our SDK☆507Feb 9, 2026Updated last month
- ☆53Nov 1, 2020Updated 5 years ago
- Official repository for DeepBinDiff☆250Dec 7, 2021Updated 4 years ago
- ☆12Nov 19, 2025Updated 4 months ago
- Works about detecting vulnerable using ML.☆87May 2, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 8 months ago
- ☆48Nov 15, 2021Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆79Dec 30, 2021Updated 4 years ago
- Flat Abstract Syntax Tree☆35Nov 4, 2017Updated 8 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- [LLVM Static Slicer] Various program analyses, construction of dependence graphs and program slicing of LLVM bitcode.☆524May 21, 2025Updated 10 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- A deep learning tool for generating platform-agnostic binary code embeddings☆21Aug 4, 2022Updated 3 years ago