☆56Oct 22, 2020Updated 5 years ago
Alternatives and similar repositories for CodeCMR
Users that are interested in CodeCMR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆61Sep 2, 2019Updated 6 years ago
- Get results of binaryai.cn using our SDK☆508Feb 9, 2026Updated 3 months ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- pytorch version of the SAFE neural network☆55Jun 22, 2022Updated 3 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Mar 13, 2021Updated 5 years ago
- ☆106Oct 23, 2024Updated last year
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- BinTuner☆67Jul 25, 2022Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆175Dec 15, 2023Updated 2 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Offical Implementation for PalmTree☆149Jan 29, 2024Updated 2 years ago
- ☆311Jul 30, 2024Updated last year
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- ☆31Jul 22, 2023Updated 2 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- Official repository for DeepBinDiff☆251Dec 7, 2021Updated 4 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆20Apr 9, 2019Updated 7 years ago
- ☆140Jun 15, 2018Updated 7 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- ☆14May 23, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆37Oct 12, 2022Updated 3 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 3 years ago
- An awesome & curated list of binary code similarity papers☆603Jan 5, 2026Updated 4 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆177Jul 17, 2023Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆62Jul 6, 2025Updated 10 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆187Apr 10, 2025Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- Code and resources for the paper: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs"☆211May 10, 2021Updated 5 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆346Dec 12, 2024Updated last year
- ☆60May 7, 2025Updated last year
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 4 years ago
- statistical similarity of binaries (Esh)☆74Jul 1, 2016Updated 9 years ago