The Tangled Genealogy of IoT Malware
☆12Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for tangled_iot
Users that are interested in tangled_iot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- ☆18Apr 27, 2018Updated 7 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 9 years ago
- ☆14May 23, 2023Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Evaluation of source authorship attribution tool☆23Jun 5, 2021Updated 4 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- ☆24Apr 17, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Jun 17, 2017Updated 8 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆315Jan 13, 2021Updated 5 years ago
- Exfiltrate data with QR code videos generated from files by HTML5/JS.☆40Oct 29, 2014Updated 11 years ago
- cv-warpPolar-exampleは、OpenCVでの極座標変換/逆変換の実行例です。☆11Jul 11, 2020Updated 5 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- DyAnnotationExtractor is software for extracting annotations (highlighted text and comments) from e-documents like PDF.☆38Apr 15, 2025Updated 11 months ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Set of tools to help working with "Big Code"☆42Apr 28, 2022Updated 3 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago