aisecstudent / DeepPuzzlingLinks
Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining critical codes.
☆63Updated 4 years ago
Alternatives and similar repositories for DeepPuzzling
Users that are interested in DeepPuzzling are comparing it to the libraries listed below
Sorting:
- ☆96Updated last year
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Updated last year
- 用于存放IDA的研究资料和文档☆95Updated 4 years ago
- ☆15Updated 5 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 7 years ago
- 基于angr的污点分析引擎☆42Updated 6 years ago
- angr源码分析☆33Updated 5 years ago
- cracker for the llvm-fla-obfuscator☆24Updated 9 years ago
- ☆121Updated 7 years ago
- 0x401 Team二进制方向逆向辅助分析工具专题培训☆81Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- This is an IDA plugin to recover class information from C++ binary.☆19Updated 5 years ago
- VxWorks Fuzzer with AFL and QEMU☆48Updated 5 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 7 years ago
- ☆80Updated 7 years ago
- ☆14Updated 2 years ago
- The learn note of Angr-CTF ..☆48Updated 6 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- linux system call hook framework☆47Updated 6 years ago
- IDA plugin which queries OpenAI's ChatGPT model to speed up reverse-engineering☆50Updated 3 years ago
- A collection of POP exploits.☆30Updated 4 years ago
- ☆135Updated this week
- Summary of binary vulnerability mining techniques☆32Updated 5 years ago
- some ida script☆34Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆21Updated last year
- A simple golang reverse engineering ida plugin☆18Updated 5 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 8 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 3 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆83Updated last year