Aurore54F / JaSt
Syntactic detection of malicious (obfuscated) JavaScript files
☆70Updated 4 years ago
Related projects: ⓘ
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆78Updated last year
- Modular static malicious JavaScript detection system☆61Updated 3 years ago
- IoT Security Reading List☆62Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆82Updated 3 months ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆15Updated 4 years ago
- ☆88Updated this week
- This repository contains dynamic and static tools for IoT malware analysis☆19Updated 2 years ago
- ☆16Updated 6 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- A collection of known Domain Generation Algorithms☆67Updated 8 years ago
- An Automated Vulnerability Detection System☆55Updated 8 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆22Updated 4 years ago
- ☆14Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Updated last year
- The IoT honeypot (Master's Thesis)☆9Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- ☆57Updated 3 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆28Updated 6 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27Updated 5 years ago
- ☆74Updated 4 years ago
- Machine Learning for malicious Javascript code detection☆19Updated 7 years ago
- ☆47Updated 8 years ago
- a Machine Learning powered CSRF attacks finding tool☆24Updated 5 years ago
- ☆59Updated 7 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆100Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 8 years ago
- Yet Another YARA rule Generator☆60Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆172Updated 6 years ago
- Python utilities for joern☆35Updated 5 years ago