csvl / SEMALinks
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆115Updated 2 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- Dataset of packed PE samples☆34Updated 10 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- ☆69Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆92Updated 2 weeks ago
- Practical Data-Only Attack Generation☆40Updated 11 months ago
- ☆14Updated 3 years ago
- ☆43Updated last month
- Hardening code obfuscation against automated attacks☆133Updated last year
- Native Python3 bindings for @horsicq's Detect-It-Easy☆68Updated 3 weeks ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 2 years ago
- Writeups for CTF challenges☆31Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆121Updated 7 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- ☆101Updated 2 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆41Updated 5 months ago
- PASTIS: Collaborative Fuzzing Framework☆164Updated 3 weeks ago
- ☆36Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆59Updated 2 weeks ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- ☆24Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- IDA plugin helping reverse-engineering rust binaries☆20Updated 10 months ago
- A tool for firmware cartography☆152Updated this week
- Powershell script deobfuscation using AST in Python☆66Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆44Updated 2 months ago