ucsb-seclab / symbexcelLinks
☆14Updated 3 years ago
Alternatives and similar repositories for symbexcel
Users that are interested in symbexcel are comparing it to the libraries listed below
Sorting:
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 10 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Updated 2 years ago
- ☆12Updated 6 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- ☆26Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated 2 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- ☆44Updated last year
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last month
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆96Updated 2 weeks ago
- A tool for effective testing the binding layer of scripting languages☆79Updated 3 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆77Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆82Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Updated 4 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 7 years ago
- ☆98Updated last year
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆61Updated 6 years ago