yueduan / DeepBinDiffLinks
Official repository for DeepBinDiff
☆249Updated 4 years ago
Alternatives and similar repositories for DeepBinDiff
Users that are interested in DeepBinDiff are comparing it to the libraries listed below
Sorting:
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 4 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆170Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 7 years ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆298Updated 6 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 8 months ago
- ☆144Updated last year
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆267Updated 10 months ago
- Source code of HAL-fuzz☆155Updated 4 years ago
- ☆63Updated 2 years ago
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆65Updated 3 years ago
- Some helper scripts to set up an environment for angr development.☆122Updated last month
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆216Updated 4 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆230Updated 5 years ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 6 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Updated 3 years ago
- ☆306Updated last year
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆82Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated 3 years ago
- ☆237Updated 2 years ago
- ☆85Updated last year
- Source-binary patch presence test system.☆84Updated 3 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- ☆58Updated 4 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆119Updated 3 months ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- My fork of American Fuzzy Lop☆61Updated 7 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Updated 6 months ago