☆25Feb 21, 2019Updated 7 years ago
Alternatives and similar repositories for cross-arch-instr-model
Users that are interested in cross-arch-instr-model are comparing it to the libraries listed below
Sorting:
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- An unofficial implementation of asm2vec as a standalone python package☆172Jan 29, 2021Updated 5 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆139Jun 15, 2018Updated 7 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 9 months ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- BinTuner☆66Jul 25, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- statistical similarity of binaries (Esh)☆74Jul 1, 2016Updated 9 years ago
- ☆12May 6, 2020Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago