ucsb-seclab / symbexcelLinks
☆14Updated 3 years ago
Alternatives and similar repositories for symbexcel
Users that are interested in symbexcel are comparing it to the libraries listed below
Sorting:
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆26Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- ☆24Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 2 weeks ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- ☆28Updated last year
- Practical Data-Only Attack Generation☆40Updated 11 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- ☆50Updated 11 months ago
- ☆77Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- ☆24Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- ☆11Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆90Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆19Updated 2 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆60Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated 3 weeks ago