Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Apr 6, 2023Updated 3 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Machine Learning based Source Code Clone validation tool.☆15May 8, 2019Updated 6 years ago
- CLI tool to generate an esthetic README file 🔖🔖☆14Aug 31, 2020Updated 5 years ago
- ☆29Dec 28, 2022Updated 3 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆182Apr 10, 2025Updated last year
- ☆20Aug 28, 2024Updated last year
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Datasets of the paper: Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS☆19Apr 9, 2019Updated 7 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Parsing-based Analyzer☆75Jun 8, 2025Updated 10 months ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 5 years ago
- 🐳 PyLoader: An asynchronous Python dataloader for loading big datasets, supporting PyTorch and TensorFlow 2.x.☆11Aug 29, 2021Updated 4 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- Custom Iterable Dataset Class for Large-Scale Data Loading☆14Dec 8, 2021Updated 4 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- IDA Pro plugin which improves work with the Hex-Rays decompiler and helps in the process of reconstructing structures and classes☆18Sep 20, 2025Updated 6 months ago
- ☆25Feb 21, 2019Updated 7 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- ☆58May 7, 2025Updated 11 months ago
- Code for our paper: "Building A Coding Assistant via Retrieval-Augmented Language Models"☆10Nov 2, 2024Updated last year
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆75Sep 24, 2024Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- ☆11Sep 6, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated 2 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Dec 1, 2023Updated 2 years ago
- ☆18Sep 23, 2024Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- ☆29Dec 29, 2024Updated last year