The scalable bug search for binaries
☆71Dec 17, 2016Updated 9 years ago
Alternatives and similar repositories for Gencoding
Users that are interested in Gencoding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆139Jun 15, 2018Updated 7 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection☆85Apr 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Sep 28, 2022Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆51Jan 10, 2022Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆106Oct 23, 2024Updated last year
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆309Jul 30, 2024Updated last year
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆175Dec 15, 2023Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Offical Implementation for PalmTree☆150Jan 29, 2024Updated 2 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Record vulnerabilities and tricks found by me or my team.☆19Mar 31, 2021Updated 5 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- ☆16Sep 16, 2021Updated 4 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆66Oct 25, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- CFG explorer for binaries☆85Oct 29, 2024Updated last year
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago
- INTEL PIN dbi based process tracer☆19Jun 25, 2020Updated 5 years ago
- ☆12Sep 29, 2019Updated 6 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- Get results of binaryai.cn using our SDK☆507Feb 9, 2026Updated 2 months ago
- ☆16Jun 22, 2022Updated 3 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago