[ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications
☆15Sep 14, 2018Updated 7 years ago
Alternatives and similar repositories for BITY
Users that are interested in BITY are comparing it to the libraries listed below
Sorting:
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- ☆14Oct 24, 2023Updated 2 years ago
- A Quick Research of Active Automata Learning☆32Mar 13, 2020Updated 5 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- Concurrency Paper☆115Jun 1, 2023Updated 2 years ago
- [ICSE2020] MemLock: Memory Usage Guided Fuzzing☆71Dec 6, 2021Updated 4 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 8 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- Summary of static analysis in Java and C/C++☆18Aug 11, 2022Updated 3 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆36Oct 9, 2022Updated 3 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Updated this week
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Exfiltrate data with QR code videos generated from files by HTML5/JS.☆40Oct 29, 2014Updated 11 years ago
- DyAnnotationExtractor is software for extracting annotations (highlighted text and comments) from e-documents like PDF.☆38Apr 15, 2025Updated 10 months ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Dota Auto Chess Picker is a utility for planning your strategy☆11Oct 1, 2020Updated 5 years ago
- Neural Variable Renaming for Decompiled Binaries☆44May 4, 2020Updated 5 years ago
- Unpacks Microsoft LZNT1-compressed files by calling RtlDecompressBuffer☆13Sep 10, 2014Updated 11 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- Secure network block device☆11Dec 29, 2016Updated 9 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Dynamic analysis of multithreaded C programs☆13Feb 7, 2020Updated 6 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/lvdun☆13Dec 17, 2016Updated 9 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated this week
- Large Language Models for Software Engineering: A Systematic Literature Review☆19Sep 19, 2024Updated last year