☆38Aug 8, 2024Updated last year
Alternatives and similar repositories for Our-Datasets
Users that are interested in Our-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 16, 2022Updated 3 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Dataset with labeled benign and malicious files 🗃️☆153Jul 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆372Nov 10, 2022Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- Pytorch implementation of MalConv☆73Feb 1, 2022Updated 4 years ago
- Convert executable binary file into RGB or Greyscale png image format. Repsent 8 bit binary values as pixel and create image from these. …☆57Oct 3, 2023Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆79Oct 8, 2025Updated 6 months ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆39Jul 25, 2021Updated 4 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆94Nov 1, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Mar 28, 2026Updated last week
- ☆43Mar 29, 2026Updated last week
- 基于卷积神经网络的恶意软件检测方法☆60May 21, 2019Updated 6 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- ☆14May 14, 2018Updated 7 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Jul 25, 2023Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆18Dec 1, 2022Updated 3 years ago
- Benchmarking suite for the Web-Scale Data Management course using Locust☆14Aug 9, 2024Updated last year
- ☆17Jul 17, 2021Updated 4 years ago
- ☆16Feb 14, 2022Updated 4 years ago
- Wifi-Jamming is a simple GUI tool, yet highly effective method of causing a DoS on a wireless implemented using python pyqt5.☆11Aug 2, 2021Updated 4 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago