wcventure / PC-Malware-Sklearner
[SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature
☆19Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for PC-Malware-Sklearner
- Code-Reuse Exploits detection using Intel Processor Trace☆27Updated 6 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆31Updated 2 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 7 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 5 years ago
- AllMemPro☆43Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- experiments for IJON☆11Updated 5 years ago
- ☆16Updated 6 years ago
- AFL fuzzing coverage CFG visualization☆30Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆21Updated 4 years ago
- expansion of afl-unicorn using c++☆27Updated 5 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- ghidra scripts☆15Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- PoC for CVE-2017-0075☆36Updated 5 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆69Updated last year
- ☆44Updated 4 years ago
- ☆50Updated 5 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆23Updated 2 years ago
- libdft for win☆51Updated 11 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆38Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆14Updated 2 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 9 years ago
- convert binary to VEX IR using the C interface provided by pyvex.☆16Updated 2 years ago