SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆121Mar 10, 2025Updated 11 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆42Updated this week
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆19Jul 15, 2024Updated last year
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆14May 30, 2022Updated 3 years ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆56May 6, 2025Updated 9 months ago
- Lightweight PDB symbol parser and resolver☆28Oct 28, 2024Updated last year
- BinRec: Dynamic Binary Lifting and Recompilation☆149Sep 18, 2023Updated 2 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- An optimizing decompiler (modified to use remill semantics)☆30Jan 4, 2019Updated 7 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Aug 11, 2023Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆91Jul 28, 2024Updated last year
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 3 months ago
- Control-Flow Graph (CFG) Visualizer for VSCode☆66Feb 21, 2026Updated last week
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆86May 31, 2025Updated 9 months ago
- Rust library for lifting raw binary data to LLVM IR☆64Jul 18, 2025Updated 7 months ago
- IDA plugin for analyzing, filtering and tracing functions and call flows☆16Nov 6, 2023Updated 2 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- Symbolic Execution based on lifting amd64 to z3☆32Jul 2, 2024Updated last year
- Efficient general mixed boolean-arithmetic (MBA) simplifier☆124Updated this week
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54May 26, 2025Updated 9 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Sep 29, 2025Updated 5 months ago
- Found resources in my malware researching adventure.☆16Dec 18, 2022Updated 3 years ago
- AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit…☆21Dec 22, 2023Updated 2 years ago
- ☆20Oct 14, 2024Updated last year