Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"
☆15Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for Xunpack
Users that are interested in Xunpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cross-architecture static library detector for IoT malware☆43Jan 7, 2026Updated 2 months ago
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 4 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆29Dec 6, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Jan 17, 2023Updated 3 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆30Feb 22, 2024Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- Flipper zero NFC is mystery. KDF is the simple one in complicated☆13Sep 12, 2024Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆17May 20, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- A study of undefined behavior across foreign function boundaries in Rust libraries.☆11Feb 13, 2025Updated last year
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated last month
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- GitHub issue manager from vulnerability scan results for private repositories☆23Jan 23, 2024Updated 2 years ago
- Utility library to display license notices☆12Mar 12, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- Fakeshellは仮想的なシェル環境を提供するパッケージです。☆14Jan 17, 2023Updated 3 years ago
- An RISC-V experimental OS☆25Sep 19, 2023Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Docker environment for 4.3BSD on VAX.☆21Mar 2, 2023Updated 3 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- 基于PIn动态插桩框架的函数-循环嵌套关系分析工具:function-loop call graph profiler using Pin (Unofficial implementation of paper: Identifying Potential Parallel…☆14Sep 6, 2019Updated 6 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Oct 6, 2023Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago