Aurore54F / JaSt
Syntactic detection of malicious (obfuscated) JavaScript files
☆78Updated 4 years ago
Alternatives and similar repositories for JaSt:
Users that are interested in JaSt are comparing it to the libraries listed below
- Modular static malicious JavaScript detection system☆66Updated 4 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆80Updated last year
- IoT Security Reading List☆62Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 7 months ago
- The Tangled Genealogy of IoT Malware☆11Updated 4 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆22Updated 4 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆112Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- ☆77Updated 5 years ago
- ReDeBug Source Code.☆24Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- ☆27Updated 3 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- An Automated Vulnerability Detection System☆58Updated 8 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆71Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆104Updated 6 years ago
- JavaScript Transformation Techniques Detection☆10Updated 3 years ago
- Security methods for WeAkNess detection☆19Updated 2 months ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- ☆9Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Updated 4 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆81Updated 4 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆37Updated last year
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- Drebin - NDSS 2014 Re-implementation☆105Updated 7 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago