EQuiw / 2020-evasion-competitionLinks
Defense from the 2020 Microsoft Evasion Competition
☆17Updated 4 years ago
Alternatives and similar repositories for 2020-evasion-competition
Users that are interested in 2020-evasion-competition are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Malware Bypass Research using Reinforcement Learning☆106Updated last year
- ☆79Updated 5 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Malware Classification using Machine learning☆72Updated 10 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Framework for Adversarial Malware Evaluation.☆34Updated 5 months ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- ☆13Updated 7 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆85Updated last year
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- ☆38Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 4 years ago
- PDF Malware Parser☆20Updated 9 years ago
- Automated Yara Rule generation using Biclustering☆71Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆234Updated 3 months ago
- ☆11Updated 6 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆42Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- ☆60Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago