The Tangled Genealogy of IoT Malware
☆12Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for tangled_iot
Users that are interested in tangled_iot are comparing it to the libraries listed below
Sorting:
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆18Apr 27, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 8 years ago
- ☆24Apr 17, 2020Updated 5 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Evaluation of source authorship attribution tool☆23Jun 5, 2021Updated 4 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- AVClass malware labeling tool☆484Oct 22, 2024Updated last year
- ☆29Dec 11, 2025Updated 2 months ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- ☆44Feb 26, 2024Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆313Jan 13, 2021Updated 5 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago