csvl / SEMALinks
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆116Updated 6 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- ☆83Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆94Updated last month
- ☆109Updated 2 years ago
- FLARE Team's Binary Navigator☆277Updated last month
- Native Python3 bindings for @horsicq's Detect-It-Easy☆74Updated 4 months ago
- Get information about stripped rust executables☆34Updated 4 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- ☆53Updated last month
- A tool for firmware cartography☆158Updated 3 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 7 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆42Updated 8 months ago
- ☆32Updated 3 years ago
- ☆74Updated last year
- Notes on using the Python bindings for the Unicorn Engine☆79Updated 5 years ago
- Go fastcall analysis for ida decompiler☆42Updated 2 months ago
- Writeups for CTF challenges☆31Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- ☆25Updated 10 months ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆11Updated 2 months ago
- Slides about HyperDbg☆39Updated 2 months ago
- How to retro theme your Ghidra☆35Updated 10 months ago
- Hardening code obfuscation against automated attacks☆142Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆205Updated 4 months ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 3 months ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆19Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆132Updated 10 months ago