dessertlab / Shellcode_IA32Links
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated 2 years ago
Alternatives and similar repositories for Shellcode_IA32
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
Sorting:
- The malsource dataset☆11Updated 4 years ago
- ☆33Updated last week
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆27Updated 3 years ago
- ☆26Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆58Updated 2 months ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- AutoCorpus is a tool backed by a large language model (LLM) for automatically generating corpus files for fuzzing.☆72Updated last year
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆98Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- ☆25Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆42Updated 3 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆84Updated last week
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 5 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 7 months ago
- Research browsers☆43Updated 4 months ago
- pytorch version of the SAFE neural network☆56Updated 3 years ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆27Updated 2 years ago
- ☆83Updated 2 months ago
- ☆62Updated last month
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last year
- A tool for effective testing the binding layer of scripting languages☆79Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 3 years ago