ntt-zerolab / XunpackLinks
Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"
☆15Updated 2 years ago
Alternatives and similar repositories for Xunpack
Users that are interested in Xunpack are comparing it to the libraries listed below
Sorting:
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 9 months ago
- Practical Data-Only Attack Generation☆43Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 7 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- ☆14Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆13Updated 2 years ago
- CFG explorer for binaries☆84Updated last year
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Updated 4 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆127Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆38Updated last year
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 4 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Updated 8 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- A system call interception tool☆58Updated last year
- blackhat usa 2022 I attended☆73Updated 3 years ago
- ☆20Updated 10 months ago
- ☆81Updated 7 months ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Updated 6 years ago
- LLVM-based ROP obfuscated compiler☆13Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 3 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆131Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆38Updated last year
- ☆92Updated 6 months ago