☆10Jan 3, 2023Updated 3 years ago
Alternatives and similar repositories for BinProv
Users that are interested in BinProv are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Offical Implementation for PalmTree☆150Jan 29, 2024Updated 2 years ago
- Identifying the compiler family, version and compiler flags that generated a binary☆20Dec 19, 2019Updated 6 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆50Aug 9, 2023Updated 2 years ago
- ☆27Aug 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- C++ Implementation of Image Super-Resolution using Convolutional Neural Network SRCNN (OpenCV version)☆34Mar 9, 2023Updated 3 years ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆186Sep 8, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆60Dec 5, 2024Updated last year
- ☆88Nov 5, 2024Updated last year
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50May 21, 2019Updated 6 years ago
- Detection Engineering Tools☆26Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Independent fork of LaurieWired's GhidraMCP for continued development☆26Oct 23, 2025Updated 6 months ago
- pytorch version of the SAFE neural network☆56Jun 22, 2022Updated 3 years ago
- jSMTLIB is an open source implementation of SMT-LIB in Java, as a command-line tool, an Eclipse plugin, and an API, with interfaces to ma…☆27Nov 14, 2025Updated 5 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆12Apr 22, 2023Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- ☆12Sep 29, 2021Updated 4 years ago
- ☆52Nov 1, 2020Updated 5 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆14Aug 9, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- ☆11Mar 8, 2021Updated 5 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Generator and Internet Draft (I-D) documenting test vectors for the stream cipher ChaCha.☆12Apr 21, 2016Updated 10 years ago
- ☆42Jul 6, 2023Updated 2 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆69Mar 31, 2026Updated last month
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46May 31, 2020Updated 5 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆27Jul 26, 2024Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Securing Embedded Systems with Return Address Integrity☆16Aug 19, 2024Updated last year
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago