ucsb-seclab / symbexcelLinks
☆14Updated 3 years ago
Alternatives and similar repositories for symbexcel
Users that are interested in symbexcel are comparing it to the libraries listed below
Sorting:
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 3 months ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated last month
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Practical Data-Only Attack Generation☆40Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆26Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆77Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆17Updated 3 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- ☆15Updated 4 years ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆47Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 9 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- A gdb for fuzzing☆21Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 11 months ago
- ☆66Updated 5 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆28Updated last year
- ☆10Updated 5 years ago
- Default query sets for Joern☆27Updated 3 years ago