☆39Aug 8, 2024Updated last year
Alternatives and similar repositories for Our-Datasets
Users that are interested in Our-Datasets are comparing it to the libraries listed below
Sorting:
- ☆28Oct 21, 2020Updated 5 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Dataset with labeled benign and malicious files 🗃️☆150Jul 19, 2023Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆370Nov 10, 2022Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Convert executable binary file into RGB or Greyscale png image format. Repsent 8 bit binary values as pixel and create image from these. …☆57Oct 3, 2023Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆94Nov 1, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- ☆41Mar 9, 2026Updated last week
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- ☆14May 14, 2018Updated 7 years ago
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- TensorFlow materials☆13Jan 8, 2021Updated 5 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆15Nov 24, 2021Updated 4 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Master UI for ROBOKOP☆15Mar 31, 2023Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Simple reliable transport (Cal EE 122 Project 1, Fall 2011)☆11Oct 11, 2013Updated 12 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago