Aurore54F / JaSt
Syntactic detection of malicious (obfuscated) JavaScript files
☆81Updated 5 years ago
Alternatives and similar repositories for JaSt
Users that are interested in JaSt are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆83Updated 2 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 11 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- ☆29Updated 3 years ago
- IoT Security Reading List☆62Updated 5 years ago
- PyPI malware packages☆58Updated 6 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆116Updated 3 years ago
- ☆79Updated 5 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆74Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 7 years ago
- ReDeBug Source Code.☆24Updated last year
- An Automated Vulnerability Detection System☆60Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- AVClass malware labeling tool☆472Updated 6 months ago
- ☆58Updated 4 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆25Updated 3 years ago
- JavaScript Transformation Techniques Detection☆10Updated 3 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- ObjLupAnsys is a tool to detect prototype pollution vulnerabilities in Node.js packages. This project is written in Python and JavaScript…☆24Updated 3 years ago
- ☆19Updated 6 years ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago