pcyin / dire
Neural Variable Renaming for Decompiled Binaries
☆44Updated 4 years ago
Alternatives and similar repositories for dire:
Users that are interested in dire are comparing it to the libraries listed below
- ☆63Updated last week
- ☆61Updated 4 months ago
- GitHub Cloner & Compiler☆69Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 2 months ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- ☆25Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆87Updated 3 months ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆62Updated last year
- Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference (ICSE '20)☆54Updated 4 years ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆64Updated last year
- ☆97Updated 6 months ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- pytorch version of the SAFE neural network☆55Updated 2 years ago
- BinTuner☆62Updated 2 years ago
- ☆143Updated 6 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆121Updated 2 years ago
- ☆24Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆83Updated 5 months ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- The parser-directed Fuzzer☆38Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆29Updated 4 years ago
- A data-flow-guided fuzzer☆119Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ☆10Updated 5 years ago
- Challenge binaries (CBs) and tools from DARPA's Cyber Grand Challenge (CGC)☆18Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆217Updated 4 years ago