Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.
☆20Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for UniASM
Users that are interested in UniASM are comparing it to the libraries listed below
Sorting:
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection☆21Feb 27, 2019Updated 7 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Machine Learning based Source Code Clone validation tool.☆15May 8, 2019Updated 6 years ago
- CLI tool to generate an esthetic README file 🔖🔖☆14Aug 31, 2020Updated 5 years ago
- ☆29Dec 28, 2022Updated 3 years ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆180Apr 10, 2025Updated 11 months ago
- ☆16Aug 28, 2024Updated last year
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- Parsing-based Analyzer☆73Jun 8, 2025Updated 9 months ago
- ☆19Sep 7, 2025Updated 6 months ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Apr 3, 2021Updated 4 years ago
- 🐳 PyLoader: An asynchronous Python dataloader for loading big datasets, supporting PyTorch and TensorFlow 2.x.☆11Aug 29, 2021Updated 4 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- Custom Iterable Dataset Class for Large-Scale Data Loading☆14Dec 8, 2021Updated 4 years ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Oct 25, 2023Updated 2 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- IDA Pro plugin which improves work with the Hex-Rays decompiler and helps in the process of reconstructing structures and classes☆18Sep 20, 2025Updated 6 months ago
- ☆25Feb 21, 2019Updated 7 years ago
- ☆57May 7, 2025Updated 10 months ago
- ☆11Jul 2, 2025Updated 8 months ago
- Replication package for "Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection", ICSE 2024.☆74Sep 24, 2024Updated last year
- ☆22Oct 18, 2023Updated 2 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- ☆11Sep 6, 2024Updated last year
- Applies ROME and MEMIT on Mamba-S4 models☆14Apr 5, 2024Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Dec 1, 2023Updated 2 years ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- ☆17Sep 23, 2024Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year