EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work.
☆29Mar 8, 2022Updated 3 years ago
Alternatives and similar repositories for EVIL
Users that are interested in EVIL are comparing it to the libraries listed below
Sorting:
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆38Jul 19, 2023Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- 360网络空间测绘系统(Quake)API☆12Feb 15, 2021Updated 5 years ago
- data and code for paper "CCGIR: Information Retrieval-based Code Comment Generation Method for Smart Contracts", which accepted in KBS. 智…☆17Apr 24, 2022Updated 3 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- A large dataset of 4.2m Java source code and parallel data of their description from code search, and code summarization studies.☆15Feb 24, 2022Updated 4 years ago
- Use BERT as the encoder and GPT2 as the decoder for machine translation.☆15Jun 3, 2021Updated 4 years ago
- A list of papers and resources dedicated to code generation☆20Nov 2, 2022Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Official code of our work, AVATAR: A Parallel Corpus for Java-Python Program Translation.☆59Jul 31, 2024Updated last year
- ☆26Jun 5, 2023Updated 2 years ago
- This tool allows local LLM usage that can automate tasks without human interventention. The agent can call itself recursively and work on…☆20May 5, 2025Updated 9 months ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- 地狱犬系统:无埋点、自动织入插桩,用于监控Andorid系统中各种行为,包括页面、控件、以及方法(函数)、指令级别的劫持和注入,实现监控☆10May 12, 2021Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- 一款利用Fofa进行子域收集、Xray漏洞Fuzz、Server酱即时通知提醒的互联网暴露面资产自动化快速打点工具☆27Jun 13, 2022Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- SimADFuzz: Simulation-Feedback Fuzz Testing for Autonomous Driving Systems☆10Apr 11, 2025Updated 10 months ago
- 图形化Acunetix批量扫描工具☆24Dec 8, 2022Updated 3 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- You can encode and decode base85, ascii85, base64, base32, and base16 with this tool.☆11Oct 4, 2023Updated 2 years ago
- Basic website to showcase FTP || Participate in Hacktoberfest 2023 by contributing in the repo☆10Oct 31, 2023Updated 2 years ago
- A python library for making API calls to Bonsai BRAIN.☆15Oct 6, 2022Updated 3 years ago
- Code for generating the JuICe dataset.☆37Oct 27, 2021Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- An Abstractive Summarization(for Datasets in English format) Implementation with Transformer and Pointer-generator☆12Dec 31, 2020Updated 5 years ago
- p2p金融借贷网站项目☆12May 11, 2018Updated 7 years ago
- Source code for ISSTA'24 paper "AI Coders Are Among Us: Rethinking Programming Language Grammar Towards Efficient Code Generation"☆12Oct 21, 2024Updated last year
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Python 3 iridium communication library for the iridium 9602 modem.☆13Jun 7, 2019Updated 6 years ago