☆10Jan 3, 2023Updated 3 years ago
Alternatives and similar repositories for BinProv
Users that are interested in BinProv are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆19Dec 19, 2019Updated 6 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆49Aug 9, 2023Updated 2 years ago
- ☆27Aug 28, 2024Updated last year
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- C++ Implementation of Image Super-Resolution using Convolutional Neural Network SRCNN (OpenCV version)☆34Mar 9, 2023Updated 3 years ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆183Sep 8, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆60Dec 5, 2024Updated last year
- ☆86Nov 5, 2024Updated last year
- Towards Generic Deobfuscation of Windows API Calls☆50May 21, 2019Updated 6 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- Detection Engineering Tools☆25Updated this week
- Independent fork of LaurieWired's GhidraMCP for continued development☆25Oct 23, 2025Updated 5 months ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- jSMTLIB is an open source implementation of SMT-LIB in Java, as a command-line tool, an Eclipse plugin, and an API, with interfaces to ma…☆27Nov 14, 2025Updated 4 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- ☆11Nov 14, 2024Updated last year
- ☆12Sep 29, 2021Updated 4 years ago
- ☆53Nov 1, 2020Updated 5 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆54Mar 16, 2026Updated last week
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- ☆11Mar 8, 2021Updated 5 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Generator and Internet Draft (I-D) documenting test vectors for the stream cipher ChaCha.☆12Apr 21, 2016Updated 9 years ago
- ☆43Jul 6, 2023Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46May 31, 2020Updated 5 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Automatically identify and extract potential anti-debugging techniques used by malware.☆28Nov 20, 2024Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago