dessertlab / Shellcode_IA32Links
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated 2 years ago
Alternatives and similar repositories for Shellcode_IA32
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
Sorting:
- ☆33Updated this week
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- The malsource dataset☆11Updated 4 years ago
- ☆26Updated 2 years ago
- pytorch version of the SAFE neural network☆56Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 8 months ago
- ☆60Updated 3 months ago
- ☆65Updated 2 months ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆15Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 4 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆101Updated last year
- ☆25Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆102Updated 3 weeks ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Robust Automated Malware Unpacker☆86Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆69Updated last year
- GitHub Cloner & Compiler☆75Updated 4 years ago
- ☆13Updated 10 months ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆13Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆32Updated 2 years ago
- Cyber Reasoning System (CRS) that autonomously discovered 28 security vulnerabilities—including six previously unknown zero-days—in real-…☆58Updated last week
- ☆34Updated last year