dessertlab / Shellcode_IA32
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
☆35Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Shellcode_IA32
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆27Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆59Updated last year
- ☆24Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- ☆24Updated 9 months ago
- The malsource dataset☆10Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- ☆16Updated last month
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆26Updated last year
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆14Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆12Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- GitHub Cloner & Compiler☆58Updated 3 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆30Updated 5 years ago
- ☆10Updated 4 years ago
- ☆22Updated last year
- A list of data-only attacks☆19Updated 2 months ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆13Updated 2 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆67Updated last month
- A tool for automatically identifying syscall-guard variables☆32Updated 2 months ago
- ☆27Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆59Updated last week
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆19Updated 2 years ago
- ☆60Updated 2 years ago
- Evolving fuzzers with large language models☆16Updated 10 months ago