Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
☆25May 6, 2021Updated 5 years ago
Alternatives and similar repositories for Mem2Img
Users that are interested in Mem2Img are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 7 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Adds callbacks to thor commands☆15Mar 23, 2026Updated last month
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- A simple cross-platform script for encoding any binary file into a lossless PNG.☆20Aug 12, 2024Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Godzilla v1.0 source code☆38Aug 26, 2020Updated 5 years ago
- In this notebook, we will create an AI and time serie driven forecasting engine based on a set of 5 AI models and 5 time series models an…☆14Jun 12, 2021Updated 4 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆14Jun 28, 2023Updated 2 years ago
- The windows kernel ssdt hook demo☆16Nov 5, 2018Updated 7 years ago
- ☆14Jul 1, 2019Updated 6 years ago
- Widevine guesser to get mpd and keys from any widevine site☆15Nov 26, 2023Updated 2 years ago
- Tesla CAN bus messages and signals for 3, Y, S and X☆18Sep 10, 2023Updated 2 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆18Updated this week
- 恶意软件原理图☆60Mar 29, 2021Updated 5 years ago
- OASIS OpenC2 TC: GitHub repository used to propose and track changes to the OpenC2 Language Specification as new working draft level revi…☆17May 9, 2024Updated 2 years ago
- awesome resources about cloud security 🐿☆20Dec 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- This repo documents some of my drafted solutions to the exercises from All of Statistics by Larry Wasserman. This repo only contains solu…☆17Jan 3, 2019Updated 7 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago
- Implementations of the compilers and VMs from R. Kent Dybvig's "Three Implementation Models for Scheme." Each file is named after the se…☆24Apr 22, 2010Updated 16 years ago
- MSBuild AL bypass☆17Mar 9, 2023Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A UWB multipath triangulate localization algorithm is proposed and achieved , including the generation of UWB signal and the channel mode…☆15Jul 5, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 利用xray高级版批量收集子域名☆18Feb 19, 2020Updated 6 years ago
- NixOS bootstrapper that sets up my development environment on top of dwm-enhanced.☆16Updated this week
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- Windows CVE主防(HIPS/HIDS)☆58May 2, 2026Updated last week
- Computer Architecture UIUC SP 2018☆14May 4, 2018Updated 8 years ago
- Lab material for Algorithmic Methods for Data Science course 2015-2020, Data Science master at Sapienza University☆19Oct 9, 2020Updated 5 years ago