dessertlab / Shellcode_IA32
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆37Updated last year
Alternatives and similar repositories for Shellcode_IA32:
Users that are interested in Shellcode_IA32 are comparing it to the libraries listed below
- The malsource dataset☆10Updated 3 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13Updated 2 years ago
- ☆18Updated 3 years ago
- ☆14Updated 4 years ago
- ☆27Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- GitHub Cloner & Compiler☆61Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆22Updated 4 months ago
- ☆24Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 10 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆30Updated 2 months ago
- ☆15Updated 3 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆53Updated 3 years ago
- Here I store my proof of concepts☆13Updated 5 months ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago