pcyin / direLinks
Neural Variable Renaming for Decompiled Binaries
☆44Updated 5 years ago
Alternatives and similar repositories for dire
Users that are interested in dire are comparing it to the libraries listed below
Sorting:
- ☆69Updated 8 months ago
- GitHub Cloner & Compiler☆76Updated 4 years ago
- ☆61Updated last year
- pytorch version of the SAFE neural network☆56Updated 3 years ago
- BinTuner☆65Updated 3 years ago
- ☆106Updated last year
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 5 years ago
- ☆86Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆171Updated 2 years ago
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆38Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- ☆144Updated last year
- ☆22Updated 2 years ago
- DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types☆182Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- ☆63Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- ☆106Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Updated 2 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆194Updated 3 years ago
- ☆22Updated 5 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆162Updated 3 years ago
- ☆43Updated 3 years ago
- ☆58Updated 4 years ago
- Awesome list for asm2vec☆17Updated 5 years ago
- Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer☆88Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆120Updated 3 months ago