Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Apr 6, 2023Updated 3 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 3 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Machine Learning based Source Code Clone validation tool.☆15May 8, 2019Updated 7 years ago
- CLI tool to generate an esthetic README file 🔖🔖☆14Aug 31, 2020Updated 5 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆187Apr 10, 2025Updated last year
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Dec 11, 2022Updated 3 years ago
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆20Apr 9, 2019Updated 7 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Parsing-based Analyzer☆75Jun 8, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 5 years ago
- 🐳 PyLoader: An asynchronous Python dataloader for loading big datasets, supporting PyTorch and TensorFlow 2.x.☆11Aug 29, 2021Updated 4 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 6 months ago
- ☆19Sep 7, 2025Updated 8 months ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 3 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- IDA Pro plugin which improves work with the Hex-Rays decompiler and helps in the process of reconstructing structures and classes☆18Sep 20, 2025Updated 8 months ago
- ☆22Aug 29, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆60May 7, 2025Updated last year
- ☆11Jul 2, 2025Updated 10 months ago
- ☆22Oct 18, 2023Updated 2 years ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆76Sep 24, 2024Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- ☆11Apr 21, 2026Updated last month
- Applies ROME and MEMIT on Mamba-S4 models☆15Apr 5, 2024Updated 2 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆31Dec 1, 2023Updated 2 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- defender_database☆25Oct 31, 2023Updated 2 years ago
- ☆18Sep 23, 2024Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆84Dec 10, 2024Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆30Dec 29, 2024Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆44Dec 17, 2023Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆177Jul 17, 2023Updated 2 years ago