CyberForce / Pesidious
Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks
☆163Updated 4 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆327Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated last month
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 7 months ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated 9 months ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆59Updated 3 years ago
- ☆13Updated 2 years ago
- ☆36Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year
- ☆7Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆127Updated 3 years ago
- A C2 framework for initial access in Go☆181Updated 2 years ago
- ☆297Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆407Updated 10 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆99Updated 4 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 5 months ago
- Windows (ShadowMove) Socket Duplication☆83Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- A basic c2 / agent.☆118Updated 5 years ago
- Process Ghosting Tool☆173Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 11 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last month
- C2☆98Updated last month
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago