Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below
Sorting:
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- IDA Database Parser for Rust☆25Sep 13, 2024Updated last year
- Naive one-pass recursive descent, scannerless parser framework for Kotlin☆16Mar 15, 2020Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆178Apr 10, 2025Updated 10 months ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 4 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Dec 1, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆73Sep 24, 2024Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆82Dec 10, 2024Updated last year
- ☆29Dec 28, 2022Updated 3 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- Conversion tools for grub's awful PFF2/pf2 font format.☆10May 28, 2023Updated 2 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Oct 30, 2022Updated 3 years ago
- 台灣水庫即時水情與歷年統計☆15Feb 23, 2026Updated last week
- Bring the early-2021 UI back to YouTube!☆10Sep 17, 2025Updated 5 months ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 8 months ago
- Statistics from our binary transformation framework☆11Jan 16, 2025Updated last year
- A CTF leet flag generator☆39Feb 4, 2021Updated 5 years ago
- Parsing-based Analyzer☆70Jun 8, 2025Updated 8 months ago
- Buuoj-Pwn☆35Jul 15, 2021Updated 4 years ago