analyze source code first, then plan attack or fix code
search for darpa cgc
on github
cyber-challenge Some toy examples, to demonstrate ideas that could be used in DARPA’s Cyber Grand Challenge including modifying java bytecode and filter out html requests on the fly
EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work.
Topics
linux exploit encoder assembly decoder dataset seq2seq shellcode nmt software-exploitation codebert
Resources
Readme
License
GPL-3.0 license
Stars
13 stars
Watchers
3 watching
Forks
1 fork
Releases
No releases published
Packages
No packages published
Contributors 2
@piliguori
piliguori Pietro Liguori
@taisazero
taisazero Erfan Al-Hossami
Languages
Python
97.6%
Shell
2.0%
Other
0.4%