PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning
☆13Sep 8, 2020Updated 5 years ago
Alternatives and similar repositories for PMP
Users that are interested in PMP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- Scripts for unlinking a program back into relocatable object ELF files with Ghidra☆11Aug 20, 2023Updated 2 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- cross-architecture static library detector for IoT malware☆43Jan 7, 2026Updated 2 months ago
- Fair Android Explorer☆22Apr 19, 2023Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆19Feb 6, 2023Updated 3 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- ☆91Oct 25, 2021Updated 4 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- Scripts for scraping vintage x86 C/C++ libraries in Ghidra, in order to generate FunctionId databases.☆24Feb 1, 2023Updated 3 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- 2021 Machine Learning Security Evasion Competition☆13Sep 29, 2021Updated 4 years ago
- Open Source Agentic Coding Harness☆55Updated this week
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- The CompCert formally-verified C compiler☆11Updated this week
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆62Sep 2, 2019Updated 6 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- ATP: Directed Graph Embedding with Asymmetric Transitivity Preservation☆10Apr 18, 2019Updated 6 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- Code for paper "W-RAG: Weakly Supervised Dense Retrieval in RAG for Open-domain Question Answering"☆15Oct 2, 2025Updated 5 months ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- ☆18Nov 7, 2024Updated last year
- ☆11Apr 10, 2018Updated 7 years ago
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago