Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆38Jul 19, 2023Updated 2 years ago
Alternatives and similar repositories for Shellcode_IA32
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
Sorting:
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- Awesome-LLM4SVD from "A Systematic Literature Review on Detecting Software Vulnerabilities with Large Language Models"☆56Feb 11, 2026Updated 2 weeks ago
- Code for the NLP4Prog workshop paper "Reading StackOverflow Encourages Cheating: Adding Question TextImproves Extractive Code Generation"☆21Aug 10, 2021Updated 4 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- Seq2seq Type Inference using Static Analysis and CodeT5☆32Jul 9, 2023Updated 2 years ago
- Maco - Malware config extractor framework☆44Feb 4, 2026Updated 3 weeks ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- Martingale posterior neural networks for fast sequential decision making @ Neurips 2025☆23Nov 13, 2025Updated 3 months ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- ☆44Jun 24, 2025Updated 8 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- ☆43Jul 11, 2024Updated last year
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- Python3 program that creates a duckyscript payload to brutforce a 4-digit pin on android. It uses an improved pin list to use most used p…☆17Nov 3, 2023Updated 2 years ago
- ☆16Feb 22, 2025Updated last year
- ☆10Nov 17, 2022Updated 3 years ago
- ☆41Jan 13, 2023Updated 3 years ago
- Implementation of Implicit Graphon Neural Representation☆12Sep 1, 2023Updated 2 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Website☆12Feb 22, 2026Updated last week
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- ☆12Sep 29, 2025Updated 5 months ago
- ☆16Jun 30, 2025Updated 8 months ago
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- A Rust client for OpenAI's API☆12May 10, 2023Updated 2 years ago
- 1000个PHP代码审计案例(2016.7以前乌云公开漏洞)☆11Sep 30, 2016Updated 9 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago
- ☆15Oct 23, 2023Updated 2 years ago
- 基于JavaFX框架做的一款安卓漏洞分析桌面软件,采用了反编译技术与静态分析技术,上传apk包即可分析APP可能包含的风险。☆14Nov 23, 2022Updated 3 years ago
- an External Function Auto-Completion Tool to Strengthen the Static Binary Lifting☆13May 13, 2024Updated last year
- ☆12Dec 9, 2025Updated 2 months ago
- ☆11Nov 23, 2020Updated 5 years ago