sgfvamll / gsatLinks
A toolkit for conducting multiple static binary analysis based on Ghidra.
☆17Updated last month
Alternatives and similar repositories for gsat
Users that are interested in gsat are comparing it to the libraries listed below
Sorting:
- ☆46Updated last month
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆40Updated last year
- Full implementaion of Genius☆31Updated 2 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆99Updated 2 months ago
- ☆24Updated 9 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- ☆34Updated 2 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆18Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- ☆88Updated 2 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 6 months ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆154Updated last year
- ☆60Updated last year
- ☆34Updated 4 years ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 4 years ago
- cinspector - a static C source code analysis framework☆26Updated last year
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 4 years ago
- ☆57Updated last year
- This is the official repository for VulHawk.☆70Updated 2 years ago
- ☆27Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 2 weeks ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- ☆68Updated 11 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- ☆32Updated last month
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆55Updated 5 years ago