SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆122Mar 10, 2025Updated last year
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆43Updated this week
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆19Jul 15, 2024Updated last year
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- A Federated Learning based Android Malware Classification System☆28Feb 15, 2024Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Lightweight PDB symbol parser and resolver☆29Oct 28, 2024Updated last year
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- BinRec: Dynamic Binary Lifting and Recompilation☆149Sep 18, 2023Updated 2 years ago
- An optimizing decompiler (modified to use remill semantics)☆30Jan 4, 2019Updated 7 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- IDA plugin for analyzing, filtering and tracing functions and call flows☆16Nov 6, 2023Updated 2 years ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆57May 6, 2025Updated 10 months ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- ☆17Sep 23, 2024Updated last year
- ☆13Jan 30, 2022Updated 4 years ago
- Control-Flow Graph (CFG) Visualizer for VSCode☆66Feb 21, 2026Updated last month
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 4 months ago
- API Hooking Engine on Windows 10☆12May 10, 2024Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆93Jul 28, 2024Updated last year
- Detection and identification of bat species in audio recordings by applying multi-label Machine Learning techniques.☆16Aug 29, 2023Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Jan 15, 2024Updated 2 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆87May 31, 2025Updated 9 months ago
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆78Apr 18, 2025Updated 11 months ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- kAFL Fuzzer☆38Updated this week
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 3 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- ☆20Oct 14, 2024Updated last year