dessertlab / EVIL
EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work.
☆27Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for EVIL
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆35Updated last year
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆12Updated 2 years ago
- ☆24Updated 9 months ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- ☆36Updated this week
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆37Updated 7 months ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆14Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- ☆24Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆26Updated 3 weeks ago
- A framework for identifying vulnerabilities in VS Code extensions☆15Updated 4 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆37Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- Hodor for node.js☆13Updated last year
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆14Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆26Updated last year
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆26Updated last month
- ACER is an AST-based Callgraph Generator Development Framework☆28Updated 5 months ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆38Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 2 years ago
- ☆26Updated last year
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆16Updated last year
- A coverage-based software testing tool☆29Updated 3 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- Disassembly Generation and Processing for JARV1S☆13Updated 3 months ago
- ☆14Updated 2 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 3 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 3 years ago
- GitHub Cloner & Compiler☆58Updated 3 years ago