ntt-zerolab / XunpackLinks
Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"
☆14Updated last year
Alternatives and similar repositories for Xunpack
Users that are interested in Xunpack are comparing it to the libraries listed below
Sorting:
- LLVM-based ROP obfuscated compiler☆14Updated 3 years ago
- Practical Data-Only Attack Generation☆41Updated last year
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆13Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 6 months ago
- cross-architecture static library detector for IoT malware☆40Updated last year
- CFG explorer for binaries☆83Updated 10 months ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆19Updated 7 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 3 months ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆92Updated 3 years ago
- A set of programs used for benchmarking the strength of obfuscation☆91Updated 7 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆113Updated 9 months ago
- A tour of what some Rust language features look like after compilation.☆45Updated 2 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆127Updated last year
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 6 months ago
- ☆15Updated 2 years ago
- blackhat usa 2022 I attended☆73Updated 2 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆50Updated last year
- ☆90Updated 2 months ago
- ☆61Updated 2 weeks ago
- Make the Windows API in Ghidra easy to read and informative.☆28Updated 3 years ago
- The toolchain of Chosen-instruction attack☆18Updated 3 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆115Updated last week
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆108Updated 5 months ago
- kAFL Fuzzer☆34Updated 5 months ago
- ☆25Updated 2 years ago
- ROSA: Finding Backdoors with Fuzzing☆24Updated 2 months ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago