Pytorch implementation of MalConv
☆72Feb 1, 2022Updated 4 years ago
Alternatives and similar repositories for MalConv-Pytorch
Users that are interested in MalConv-Pytorch are comparing it to the libraries listed below
Sorting:
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- 基于深度学习的恶意软件检测研究;MalConv;☆118Jun 22, 2022Updated 3 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,130Nov 22, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 4 months ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- Malware Detection and Classification Using Machine Learning☆345Jun 5, 2017Updated 8 years ago
- ☆12May 30, 2019Updated 6 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- A Text2Speech Engine built in Pytorch.☆12Dec 9, 2018Updated 7 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- ☆17May 30, 2018Updated 7 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- 2021 Machine Learning Security Evasion Competition☆13Sep 29, 2021Updated 4 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- WAF Environment for OpenAI Gym☆14Dec 13, 2020Updated 5 years ago
- Python implementation of the LZJD algorithm☆33Jul 10, 2025Updated 7 months ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- 处理语雀转markdown时的图片链接问题☆12May 16, 2022Updated 3 years ago
- ☆20Nov 6, 2024Updated last year
- Deep Probabilistic Programming Language☆19Jul 25, 2024Updated last year
- Slides for my intro to deep reinforcement learning at Imperial College☆17Apr 8, 2018Updated 7 years ago
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- ☆18Aug 4, 2020Updated 5 years ago
- some general useful python tools for genomics☆20Aug 12, 2020Updated 5 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Mar 14, 2022Updated 3 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago