Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"
☆15Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for Xunpack
Users that are interested in Xunpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cross-architecture static library detector for IoT malware☆44Jan 7, 2026Updated 3 months ago
- LLVM-based ROP obfuscated compiler☆12Mar 24, 2022Updated 4 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆30Dec 6, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Jan 17, 2023Updated 3 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 3 years ago
- Flipper zero NFC is mystery. KDF is the simple one in complicated☆13Sep 12, 2024Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆18May 20, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆44Dec 17, 2023Updated 2 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- A study of undefined behavior across foreign function boundaries in Rust libraries.☆11Feb 13, 2025Updated last year
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 4 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Apr 15, 2026Updated 3 weeks ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- GitHub issue manager from vulnerability scan results for private repositories☆23Jan 23, 2024Updated 2 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Utility library to display license notices☆12Apr 16, 2026Updated 2 weeks ago
- ☆16Aug 22, 2019Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Disassemblers with various trimming methodologies☆15Mar 22, 2026Updated last month
- An RISC-V experimental OS☆27Sep 19, 2023Updated 2 years ago
- Fakeshellは仮想的なシェル環境を提供するパッケージです。☆14Jan 17, 2023Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆17Jul 17, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Docker environment for 4.3BSD on VAX.☆22Mar 2, 2023Updated 3 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- 基于PIn动态插桩框架的函数-循环嵌套关系分析工具:function-loop call graph profiler using Pin (Unofficial implementation of paper: Identifying Potential Parallel…☆13Sep 6, 2019Updated 6 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆15Apr 22, 2026Updated 2 weeks ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago