eurecom-s3 / AAl-Khaser
Android Al-Khaser
☆14Updated last year
Alternatives and similar repositories for AAl-Khaser:
Users that are interested in AAl-Khaser are comparing it to the libraries listed below
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆113Updated last month
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated 11 months ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆185Updated 7 months ago
- ☆68Updated 5 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆174Updated 2 years ago
- PASTIS: Collaborative Fuzzing Framework☆163Updated 8 months ago
- A curated list of malware-related papers.☆27Updated last year
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 4 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆52Updated this week
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 5 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last week
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆620Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆152Updated 5 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆218Updated last week
- ☆22Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆316Updated last month
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆63Updated 9 months ago
- ☆45Updated 3 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆92Updated last year
- ☆318Updated 10 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆363Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆14Updated 3 years ago
- ☆29Updated 3 weeks ago
- Linux & Android Kernel Vulnerability research and exploitation☆39Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆70Updated 4 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆68Updated last year
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆27Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆43Updated 2 years ago
- FLARE Team's Binary Navigator☆252Updated 3 weeks ago