rakshithShetty / A4NT-author-maskingLinks
Repository for author masking
☆12Updated 6 years ago
Alternatives and similar repositories for A4NT-author-masking
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
Sorting:
- PDF Malware Parser☆20Updated 9 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- A set of templates for different academic venues.☆28Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- ☆11Updated last year
- ☆12Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Updated 5 years ago
- ☆79Updated 5 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- QEmu backend for avatar²☆21Updated 6 months ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- Securing System Logs With Intel SGX☆15Updated 8 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 7 years ago
- Debugging library to quickly get the minimal crashing test case☆37Updated 7 years ago