Forecasting Malware Capabilities From Cyber Attack Memory Images
☆34Jan 9, 2023Updated 3 years ago
Alternatives and similar repositories for Forecast
Users that are interested in Forecast are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆82Sep 3, 2021Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- ☆12Mar 23, 2019Updated 7 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- ☆12Aug 5, 2025Updated 8 months ago
- ☆34Nov 11, 2021Updated 4 years ago
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆33Jan 3, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 自然语言处理方面资料集☆10May 8, 2020Updated 5 years ago
- ☆14May 30, 2022Updated 3 years ago
- ☆57Oct 15, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Mar 12, 2021Updated 5 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆28Aug 10, 2020Updated 5 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- gulp plugin to convert html file to txt.☆10May 1, 2020Updated 5 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Aug 7, 2021Updated 4 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago