dessertlab / Shellcode_IA32
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated last year
Alternatives and similar repositories for Shellcode_IA32:
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
- The malsource dataset☆10Updated 3 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆21Updated 3 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆56Updated 3 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- GitHub Cloner & Compiler☆69Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated last year
- ☆27Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Updated last year
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆73Updated last week
- ☆16Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- ☆24Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 4 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- ☆29Updated 7 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆24Updated 2 years ago
- ☆24Updated 2 years ago
- ☆11Updated 3 years ago