CyberForce / Pesidious
Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks
☆163Updated 4 years ago
Alternatives and similar repositories for Pesidious:
Users that are interested in Pesidious are comparing it to the libraries listed below
- Malware Bypass Research using Reinforcement Learning☆104Updated 11 months ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆322Updated 2 years ago
- Adversarial Malware Generator Using GANs☆53Updated 8 months ago
- Framework for Adversarial Malware Evaluation.☆33Updated this week
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆38Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆218Updated 2 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆226Updated 3 months ago
- Botnet Simulation Framework☆78Updated 4 years ago
- ☆7Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆79Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 5 months ago
- DeepLocker - Deep learning based malware☆31Updated 6 years ago
- malicious PowerShell script detection model☆38Updated 3 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆468Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆202Updated last year
- A large-scale database of malicious software images☆47Updated 3 years ago
- C2☆92Updated 2 weeks ago
- ☆295Updated 3 years ago
- ☆13Updated 2 years ago
- ☆411Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆332Updated 3 months ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆397Updated 8 months ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆195Updated 8 months ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 10 months ago
- ☆130Updated last year