uqcyber / ColdPressLinks
Extensible Platform for Malware Analysis
☆17Updated 5 years ago
Alternatives and similar repositories for ColdPress
Users that are interested in ColdPress are comparing it to the libraries listed below
Sorting:
- Automated Yara Rule generation using Biclustering☆76Updated 4 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- ☆72Updated 8 years ago
- ☆25Updated 6 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- ☆63Updated 4 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆103Updated last year
- ☆26Updated 3 years ago
- ☆82Updated 5 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- ☆45Updated 3 years ago
- Trigram database written in C++, suited for malware indexing☆130Updated 2 weeks ago
- Target-centric program analysis.☆76Updated 3 weeks ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- Semantic Crash Bucketing☆16Updated 5 years ago
- ☆80Updated 6 years ago
- A framework for streamlining the capture of PANDA execution traces.☆57Updated 5 years ago
- ☆47Updated 5 years ago
- ☆30Updated 4 years ago
- Utilities for generating dynamic traces☆94Updated 10 months ago
- IoT Security Reading List☆62Updated 5 years ago
- Fuzzer for Wasm and Wasmer☆33Updated 5 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Updated 7 years ago