rakshithShetty / A4NT-author-maskingLinks
Repository for author masking
☆12Updated 6 years ago
Alternatives and similar repositories for A4NT-author-masking
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
Sorting:
- PDF Malware Parser☆20Updated 9 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- ☆12Updated 4 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- bitshred research project code.☆14Updated 9 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- ☆79Updated 5 years ago
- A set of templates for different academic venues.☆28Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- QEmu backend for avatar²☆21Updated 3 months ago
- Structural Analysis and Detection of Android Malware☆77Updated last year
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆71Updated 4 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆56Updated 6 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Haxxis Visualization System☆26Updated 8 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆221Updated last year
- ☆25Updated 2 years ago
- ☆25Updated 6 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago