ucsb-seclab / symbexcel
☆14Updated 2 years ago
Alternatives and similar repositories for symbexcel:
Users that are interested in symbexcel are comparing it to the libraries listed below
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆24Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆120Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 3 years ago
- Practical Data-Only Attack Generation☆39Updated 10 months ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- ☆60Updated last year
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- ☆11Updated 5 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆30Updated 3 years ago
- angr's exploration technique to perform taint analysis☆60Updated 5 years ago
- ☆24Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- ☆24Updated 2 years ago
- ☆20Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- ☆24Updated 6 years ago
- AFLNW: network wrapper for AFL☆47Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- OSS-Fuzz Public Corpora Crawler☆22Updated 2 years ago