SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆122Mar 10, 2025Updated last year
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆43Mar 31, 2026Updated last week
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆18Jul 15, 2024Updated last year
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Federated Learning based Android Malware Classification System☆27Feb 15, 2024Updated 2 years ago
- ☆14May 30, 2022Updated 3 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42May 7, 2023Updated 2 years ago
- Lightweight PDB symbol parser and resolver☆30Oct 28, 2024Updated last year
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- BinRec: Dynamic Binary Lifting and Recompilation☆149Sep 18, 2023Updated 2 years ago
- ☆12Mar 23, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An optimizing decompiler (modified to use remill semantics)☆30Jan 4, 2019Updated 7 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- IDA plugin for analyzing, filtering and tracing functions and call flows☆16Nov 6, 2023Updated 2 years ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆56May 6, 2025Updated 11 months ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 3 years ago
- ☆18Sep 23, 2024Updated last year
- ☆13Jan 30, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 5 months ago
- API Hooking Engine on Windows 10☆10May 10, 2024Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆93Jul 28, 2024Updated last year
- Control-Flow Graph (CFG) Visualizer for VSCode☆68Updated this week
- Detection and identification of bat species in audio recordings by applying multi-label Machine Learning techniques.☆16Aug 29, 2023Updated 2 years ago
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Jan 15, 2024Updated 2 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 5 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆87May 31, 2025Updated 10 months ago
- A collection of Proof-of-Concept implementations of various anti-disassembly techniques for ARM32 and ARM64 architectures.☆78Apr 18, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Dataset of packed ELF samples☆20Jan 24, 2026Updated 2 months ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 4 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- kAFL Fuzzer☆38Mar 16, 2026Updated 3 weeks ago
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 3 years ago