dessertlab / Shellcode_IA32
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated last year
Alternatives and similar repositories for Shellcode_IA32
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
Sorting:
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆64Updated 2 years ago
- ☆29Updated last month
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- The malsource dataset☆10Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆28Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 3 years ago
- Binary Ninja Call Graph plugin☆20Updated 3 years ago
- ☆28Updated last year
- ☆40Updated 3 weeks ago
- ☆26Updated last year
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆13Updated 3 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- ☆10Updated 4 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- IDA SIG files for multiarch uClibc library☆37Updated 6 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- ☆14Updated 4 years ago