ucsb-seclab / symbexcel
☆14Updated 2 years ago
Alternatives and similar repositories for symbexcel
Users that are interested in symbexcel are comparing it to the libraries listed below
Sorting:
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆24Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆122Updated 2 years ago
- ☆24Updated 2 years ago
- Practical Data-Only Attack Generation☆39Updated 11 months ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- Additional code and data for the automated malware generation paper☆12Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆114Updated 2 months ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆51Updated 6 months ago
- angr's exploration technique to perform taint analysis☆61Updated 5 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆92Updated 2 weeks ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- ☆50Updated 10 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆68Updated 7 months ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago