ucsb-seclab / symbexcel
☆14Updated 2 years ago
Alternatives and similar repositories for symbexcel:
Users that are interested in symbexcel are comparing it to the libraries listed below
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 6 months ago
- ☆24Updated 2 years ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- ☆72Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆24Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- Practical Data-Only Attack Generation☆34Updated 8 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆119Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆107Updated 2 months ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 5 months ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- ☆23Updated 2 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- ☆15Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 8 months ago
- A collection of widely-fuzzed targets☆45Updated 5 years ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 3 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- Run fuzzing experiments in Docker☆100Updated 3 years ago
- ☆24Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Very Simple Fuzzer☆20Updated 4 years ago