aisecstudent / DeepPuzzlingLinks
Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining critical codes.
☆63Updated 4 years ago
Alternatives and similar repositories for DeepPuzzling
Users that are interested in DeepPuzzling are comparing it to the libraries listed below
Sorting:
- ☆98Updated last year
- 用于存放IDA的研究资料和文档☆95Updated 4 years ago
- cracker for the llvm-fla-obfuscator☆24Updated 9 years ago
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Updated last year
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- linux system call hook framework☆47Updated 7 years ago
- ☆123Updated 7 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆38Updated last year
- Rizzo plugin by devttys0, ported to IDA 7☆54Updated 7 years ago
- angr源码分析☆33Updated 6 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 7 years ago
- ☆65Updated 4 years ago
- ☆15Updated 6 years ago
- ☆80Updated 7 years ago
- 国科大软件安全原理作业☆25Updated 5 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- 基于angr的污点分析引擎☆42Updated 6 years ago
- some ida script☆34Updated 4 years ago
- ☆14Updated 2 years ago
- 0x401 Team二进制方向逆向辅助分析工具专题培训☆81Updated 4 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Updated 5 years ago
- The learn note of Angr-CTF ..☆48Updated 6 years ago
- IDA_Signsrch in Python☆106Updated last week
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- A Static Dataflow Analysis Framework for iOS Applications.☆51Updated last year
- IDA Hexrays To Joern☆45Updated last year
- Suspended☆75Updated 9 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆82Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Updated 9 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago