js2wasm-obfuscator / translatorLinks
☆30Updated 4 years ago
Alternatives and similar repositories for translator
Users that are interested in translator are comparing it to the libraries listed below
Sorting:
- ☆43Updated 3 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- ☆58Updated 4 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 7 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆78Updated 4 years ago
- An standalone execution trace library built on DynamoRIO.☆23Updated 3 years ago
- ☆78Updated 3 years ago
- ☆10Updated 3 years ago
- ☆50Updated 5 years ago
- Onsite Analysis Infrastructure☆16Updated 5 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- ☆39Updated 5 years ago
- We hinder fuzzing☆69Updated 4 years ago
- ☆68Updated 4 years ago
- The scalable bug search for binaries☆71Updated 9 years ago
- ☆106Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 7 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Offical Implementation for PalmTree☆147Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- ☆61Updated 3 years ago
- User Guided API Misuse Detection☆30Updated 3 years ago
- source code for savior fuzzer☆127Updated 5 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Updated 3 years ago