dessertlab / EVILLinks
EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work.
☆28Updated 3 years ago
Alternatives and similar repositories for EVIL
Users that are interested in EVIL are comparing it to the libraries listed below
Sorting:
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 3 years ago
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆37Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- ☆26Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆42Updated last year
- ☆11Updated last year
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆29Updated 8 months ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Updated last year
- ExploitGen is a template-augmented Exploit Code generation method based on CodeBERT, which accepted in JSS.☆9Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 2 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated last year
- A framework for identifying vulnerabilities in VS Code extensions☆18Updated 11 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated last month
- ☆25Updated last year
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆25Updated 4 months ago
- ☆30Updated 9 months ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- ☆10Updated 4 years ago
- ☆17Updated 2 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆13Updated 3 years ago
- The RunBugRun dataset of executable bugs☆23Updated 2 weeks ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Updated 4 years ago
- Code for the paper "A Structural Model for Contextual Code Changes"☆32Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago