packgenome / PackGenome-Artifacts
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
☆22Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for PackGenome-Artifacts
- ☆12Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- ☆26Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆34Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 3 months ago
- A tool for automatically identifying syscall-guard variables☆32Updated 2 months ago
- angr源码分析☆32Updated 4 years ago
- ☆14Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Updated last year
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆14Updated last year
- This tool is used to handle firmware that binwalk cannot unpack directly and is mainly used for OOB removal, ECC removal, and bad block r…☆16Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated 3 months ago
- ☆70Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆27Updated 3 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆67Updated 2 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆22Updated 10 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- 国科大软件安全原理作业☆23Updated 4 years ago
- The toolchain of Chosen-instruction attack☆18Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆18Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆21Updated 4 years ago
- ☆79Updated 4 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆114Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆37Updated 2 weeks ago
- ☆23Updated 2 months ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆27Updated 2 years ago