implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'
☆14Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for neural-taint-analysis
Users that are interested in neural-taint-analysis are comparing it to the libraries listed below
Sorting:
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ViDeZZo source code.☆39Apr 15, 2025Updated 10 months ago
- An llvm pass to perform taint analysis on your code.☆38Sep 25, 2019Updated 6 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- ☆20May 27, 2020Updated 5 years ago
- ☆21Feb 15, 2022Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆61Jan 22, 2021Updated 5 years ago
- ☆21May 10, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- angr源码分析☆33Jan 6, 2020Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- binary ninja related code☆37Mar 27, 2025Updated 11 months ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- Labeled vulnerable functions statistics analysis and neural network training☆29Jul 25, 2019Updated 6 years ago
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated last year
- ☆39Jun 23, 2025Updated 8 months ago
- ☆78Sep 2, 2022Updated 3 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Statement-level deep learning model for automated software vulnerability detection in C/C++ (Accepted in MSR 2022)☆75Jun 24, 2022Updated 3 years ago
- ☆37May 11, 2022Updated 3 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- Run fuzzing experiments in Docker☆32Mar 17, 2021Updated 4 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Clang static checker that carries out tainting analysis.☆88Mar 25, 2018Updated 7 years ago
- COVA - A static analysis tool to compute path conditions☆40Updated this week
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- SIGPLAN website☆13Feb 23, 2026Updated last week