Aurore54F / JaStLinks
Syntactic detection of malicious (obfuscated) JavaScript files
☆83Updated 5 years ago
Alternatives and similar repositories for JaSt
Users that are interested in JaSt are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆87Updated 2 years ago
- IoT Security Reading List☆63Updated 5 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- PyPI malware packages☆58Updated 6 years ago
- a Machine Learning powered CSRF attacks finding tool☆26Updated 6 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
- NVD/CVE as JSON files☆122Updated last week
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 8 years ago
- ☆13Updated 8 years ago
- ReDeBug Source Code.☆24Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆64Updated 2 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆178Updated 2 years ago
- ☆16Updated 7 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Automated Yara Rule generation using Biclustering☆70Updated 4 years ago
- An Automated Vulnerability Detection System☆60Updated 9 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- ☆79Updated 5 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆74Updated 4 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago