dessertlab / Shellcode_IA32Links
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated 2 years ago
Alternatives and similar repositories for Shellcode_IA32
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
Sorting:
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 3 years ago
- The malsource dataset☆12Updated 4 years ago
- ☆39Updated last month
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16Updated 2 years ago
- ☆69Updated 6 months ago
- ☆25Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- ☆12Updated 6 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆103Updated last year
- ☆66Updated 4 months ago
- ☆26Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 10 months ago
- pytorch version of the SAFE neural network☆56Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆38Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆187Updated 3 years ago
- ☆77Updated 3 years ago
- Files used for reproducing Fuzzware's experiments☆61Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Updated 2 years ago
- Robust Automated Malware Unpacker☆87Updated 2 years ago
- GitHub Cloner & Compiler☆76Updated 4 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Updated 2 years ago