Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
☆25May 6, 2021Updated 4 years ago
Alternatives and similar repositories for Mem2Img
Users that are interested in Mem2Img are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 7 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Adds callbacks to thor commands☆15Mar 23, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- okl4 git for porting to realview_eb RTSM platform☆15Oct 17, 2012Updated 13 years ago
- Godzilla v1.0 source code☆38Aug 26, 2020Updated 5 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- YARA Language Server☆74Feb 3, 2026Updated 2 months ago
- SAveRUNNER (Searching off-lAbel dRUg aNd NEtwoRk) - a network-based approach for drug repurposing☆13Nov 27, 2024Updated last year
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- The windows kernel ssdt hook demo☆16Nov 5, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 4, 2020Updated 5 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- ☆15Jun 5, 2024Updated last year
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- 恶意软件原理图☆60Mar 29, 2021Updated 5 years ago
- Introduction to Python tutorial at SciPy 2018☆13Jul 9, 2018Updated 7 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- ☆10Nov 1, 2021Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- This repo documents some of my drafted solutions to the exercises from All of Statistics by Larry Wasserman. This repo only contains solu…☆17Jan 3, 2019Updated 7 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago
- Implementations of the compilers and VMs from R. Kent Dybvig's "Three Implementation Models for Scheme." Each file is named after the se…☆24Apr 22, 2010Updated 15 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- MSBuild AL bypass☆17Mar 9, 2023Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 利用xray高级版批量收集子域名☆18Feb 19, 2020Updated 6 years ago
- Windows CVE主防(HIPS/HIDS)☆58Apr 29, 2021Updated 4 years ago
- ☆66Jan 8, 2026Updated 3 months ago
- external c2 use domainhiding.☆49Oct 27, 2020Updated 5 years ago
- Computer Architecture UIUC SP 2018☆14May 4, 2018Updated 7 years ago
- Tesla IOT Key☆11Dec 5, 2018Updated 7 years ago
- Lab material for Algorithmic Methods for Data Science course 2015-2020, Data Science master at Sapienza University☆19Oct 9, 2020Updated 5 years ago