csvl / SEMALinks
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆117Updated 5 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- ☆80Updated last week
- ☆106Updated 2 years ago
- FLARE Team's Binary Navigator☆276Updated 3 weeks ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆94Updated 3 weeks ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 2 months ago
- Get information about stripped rust executables☆33Updated 3 months ago
- ☆16Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 10 months ago
- How to retro theme your Ghidra☆35Updated 9 months ago
- ☆28Updated 7 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year
- Slides about HyperDbg☆40Updated last month
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- The malsource dataset☆11Updated 3 years ago
- ☆74Updated last year
- A tool for firmware cartography☆158Updated 2 months ago
- ☆51Updated last month
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- ☆131Updated 3 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆131Updated last month
- Binary analysis MCPs collections☆33Updated last week
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated 3 months ago
- ☆33Updated 2 years ago
- ☆25Updated 9 months ago
- Writeups for CTF challenges☆31Updated last year
- Hardening code obfuscation against automated attacks☆141Updated last year
- ☆15Updated 2 years ago