Lancern/asm2vec

An unofficial implementation of asm2vec as a standalone python package

39
/ 100
Emerging

This package helps reverse engineers and security researchers analyze compiled software by converting assembly code functions into numerical representations, called 'vectors'. It takes assembly code, either manually defined or parsed from a source file, and outputs these vectors, which can be used to compare functions or identify code similarities even when obfuscated. The primary users are binary analysts and cybersecurity professionals.

172 stars. No commits in the last 6 months.

Use this if you need to programmatically analyze and compare compiled binary code, especially for tasks like identifying code reuse, detecting malware variants, or searching for vulnerabilities across different software versions.

Not ideal if you are not comfortable working with Python or if your analysis workflow doesn't involve processing assembly code at a functional level.

reverse-engineering malware-analysis binary-analysis software-security vulnerability-research
No License Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 10 / 25
Maturity 8 / 25
Community 21 / 25

How are scores calculated?

Stars

172

Forks

34

Language

Python

License

Last pushed

Jan 29, 2021

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/nlp/Lancern/asm2vec"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.