br0kej / FASERLinks
Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605
☆14Updated 2 years ago
Alternatives and similar repositories for FASER
Users that are interested in FASER are comparing it to the libraries listed below
Sorting:
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆55Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Updated 4 years ago
- ☆26Updated 3 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- Symbolic Execution Over Processor Traces☆126Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆58Updated 5 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- ☆70Updated 6 months ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ☆64Updated last month
- Triton-based DSE library with loading and exploration capabilities (and more!)☆135Updated last month
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆54Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 5 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- ☆12Updated 6 years ago
- tool for multi-execution jump coverage introspection☆68Updated last year
- OSS-Fuzz Public Corpora Crawler☆30Updated 2 years ago
- Code snippets for Binary Ninja's Python API☆31Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 11 months ago
- A coverage-based software testing tool☆34Updated 5 years ago
- ☆77Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆120Updated 3 months ago