csvl / SEMALinks
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
☆120Updated 8 months ago
Alternatives and similar repositories for SEMA
Users that are interested in SEMA are comparing it to the libraries listed below
Sorting:
- ☆109Updated 2 years ago
- ☆84Updated 3 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆95Updated 3 weeks ago
- ☆16Updated last year
- FLARE Team's Binary Navigator☆296Updated last month
- A tool for firmware cartography☆161Updated this week
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 3 weeks ago
- Dataset of packed PE samples☆41Updated last year
- ☆61Updated 4 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated 2 months ago
- How to retro theme your Ghidra☆35Updated last month
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- A headless, extendable, multi-session, IDA Pro MCP framework.☆83Updated 2 months ago
- Rerousces related to time-travel debugging (TTD)☆24Updated 3 weeks ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- ☆79Updated 11 months ago
- Get information about stripped rust executables☆38Updated 6 months ago
- Powershell script deobfuscation using AST in Python☆72Updated 2 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆65Updated last year
- Notes on using the Python bindings for the Unicorn Engine☆80Updated 5 years ago
- ☆74Updated last year
- Writeups for CTF challenges☆33Updated 2 years ago
- ☆132Updated last month
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Các IDA Flirt signatures HTC tạo☆20Updated last year