The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search》(https://arxiv.org/abs/2411.01102)
☆30Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for BinEnhance
Users that are interested in BinEnhance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- The code and dataset of the paper.☆15Mar 27, 2025Updated last year
- ☆21Sep 10, 2024Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Mar 20, 2026Updated last week
- ☆18Mar 18, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- ☆71Jul 24, 2025Updated 8 months ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆30May 7, 2024Updated last year
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 9 months ago
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- Multi-granularity vulnerability detection with a novel pre-trained code model☆19Dec 15, 2025Updated 3 months ago
- Utility library for analysis of Control Flow Graphs, home to the Basque CFGED algorithm.☆34Jan 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- (NDSS 2024) Optimizing Decompiler Output with LLM☆130Sep 8, 2024Updated last year
- ☆17Aug 31, 2023Updated 2 years ago
- Official implementation of the paper "HermesBDD: A Multi-Core and Multi-Platform Binary Decision Diagram Package" accepted @ DDECS 2023.☆13Jul 11, 2025Updated 8 months ago
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- ☆13Jun 15, 2023Updated 2 years ago
- SecVulEval is a dataset of C/C++ vulnerabilities.☆18Dec 20, 2025Updated 3 months ago
- ☆31Jul 21, 2020Updated 5 years ago
- This is the official repository for VulHawk.☆76Mar 28, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆12Jul 2, 2025Updated 8 months ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆13Jan 22, 2025Updated last year
- IDB parser☆26Nov 24, 2025Updated 4 months ago
- Code Continuity Analysis Framework☆23Mar 3, 2025Updated last year
- ☆43Mar 9, 2026Updated 2 weeks ago
- An implementation for Sugyama's algorithm for displaying a layered graph.☆24Sep 21, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆43Jun 14, 2022Updated 3 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆62Jul 6, 2025Updated 8 months ago
- yara and radare2, better together☆27Mar 19, 2026Updated last week
- The official repository for the paper "VulScribeR: Exploring RAG-based Vulnerability Augmentation with LLMs".☆24Dec 9, 2025Updated 3 months ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- ☆25Aug 6, 2025Updated 7 months ago
- ☆65Dec 17, 2025Updated 3 months ago