{"id":15117549,"url":"https://github.com/csvl/SEMA","last_synced_at":"2025-09-27T23:31:31.926Z","repository":{"id":52307153,"uuid":"468670789","full_name":"csvl/SEMA","owner":"csvl","description":" SEMA is based on angr, a symbolic execution engine  used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.","archived":false,"fork":false,"pushed_at":"2024-11-26T22:09:17.000Z","size":1522938,"stargazers_count":103,"open_issues_count":14,"forks_count":21,"subscribers_count":3,"default_branch":"production","last_synced_at":"2025-01-14T10:10:41.820Z","etag":null,"topics":["angr","binary-analysis","classification","concolic-execution","ctf","cybersecurity","detection","linux","malware","malware-analysis","malware-detection","malware-research","python","reverse","reverse-engineering","sema","static-analysis","symbolic","symbolic-execution","windows"],"latest_commit_sha":null,"homepage":"https://csvl.github.io/SEMA/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-2-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/csvl.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-03-11T08:36:34.000Z","updated_at":"2025-01-11T18:34:23.000Z","dependencies_parsed_at":"2024-11-21T13:44:29.411Z","dependency_job_id":null,"html_url":"https://github.com/csvl/SEMA","commit_stats":null,"previous_names":["csvl/sema","csvl/sema-toolchain"],"tags_count":6,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/csvl%2FSEMA","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/csvl%2FSEMA/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/csvl%2FSEMA/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/csvl%2FSEMA/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/csvl","download_url":"https://codeload.github.com/csvl/SEMA/tar.gz/refs/heads/production","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":234470280,"owners_count":18838628,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["angr","binary-analysis","classification","concolic-execution","ctf","cybersecurity","detection","linux","malware","malware-analysis","malware-detection","malware-research","python","reverse","reverse-engineering","sema","static-analysis","symbolic","symbolic-execution","windows"],"created_at":"2024-09-26T01:45:59.442Z","updated_at":"2025-09-27T23:31:21.916Z","avatar_url":"https://github.com/csvl.png","language":"Python","readme":null,"funding_links":[],"categories":["Using AI for Pentesting"],"sub_categories":["Prediction"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcsvl%2FSEMA","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcsvl%2FSEMA","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcsvl%2FSEMA/lists"}