csvl / SEMA
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆114Updated 2 months ago
Alternatives and similar repositories for SEMA:
Users that are interested in SEMA are comparing it to the libraries listed below
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆92Updated last week
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Practical Data-Only Attack Generation☆39Updated 11 months ago
- ☆14Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- ☆36Updated last year
- PASTIS: Collaborative Fuzzing Framework☆164Updated 8 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Hardening code obfuscation against automated attacks☆131Updated last year
- ☆68Updated 2 years ago
- Dataset of packed PE samples☆34Updated 9 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- AutoCorpus is a tool backed by a large language model (LLM) for automatically generating corpus files for fuzzing.☆70Updated last year
- IDA plugin helping reverse-engineering rust binaries☆17Updated 9 months ago
- ☆34Updated 2 weeks ago
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- ☆58Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆176Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆64Updated last month
- ☆101Updated 2 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆11Updated 11 months ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- Powershell script deobfuscation using AST in Python☆66Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆104Updated 2 weeks ago
- A tool for firmware cartography☆147Updated 4 months ago