uqcyber / ColdPress
Extensible Platform for Malware Analysis
☆17Updated 4 years ago
Alternatives and similar repositories for ColdPress:
Users that are interested in ColdPress are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 3 years ago
- Default query sets for Joern☆26Updated 3 years ago
- ☆47Updated 4 years ago
- Grey-box fuzzer SIVO☆14Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 4 months ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 3 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆88Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆58Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- This is the project of LearnAFL.☆27Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆19Updated 7 years ago
- ☆11Updated 3 years ago
- ☆16Updated 5 years ago
- FunSeeker: Binary Function Identification Tool☆25Updated last year
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 6 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated 2 months ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 5 years ago
- ☆53Updated 7 years ago
- Practical Data-Only Attack Generation☆38Updated 9 months ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago