☆13Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for Malware-Detection
Users that are interested in Malware-Detection are comparing it to the libraries listed below
Sorting:
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- ☆31Aug 26, 2015Updated 10 years ago
- Malware Detection and Classification Using Machine Learning☆345Jun 5, 2017Updated 8 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Text Classification Dataset for Turkish Language☆10Nov 16, 2021Updated 4 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- RNN implementation with Keras for machine activity data to predict malware☆43Feb 1, 2024Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 6 months ago
- Demonstrating the usage of FGYM: A Toolkit for benchmarking FPGA-accelerated Reinforcement Learning☆13Aug 12, 2021Updated 4 years ago
- ☆10Jan 2, 2020Updated 6 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Get a company's financials and stock information using a simple and intuitive API☆12Dec 9, 2022Updated 3 years ago
- ☆18Apr 20, 2022Updated 3 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Queuing app for 3D printing☆13Jan 5, 2021Updated 5 years ago
- ☆54Sep 1, 2021Updated 4 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- 📮 Lightweight, high performance and configurable API rate limiter.☆15Apr 13, 2021Updated 4 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- 远控控制端☆10Mar 7, 2018Updated 7 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Example osquery configuration for Linux servers using eBPF for events☆16Aug 27, 2021Updated 4 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- Trend Micro XDR/Vision One Hunting Recipies☆18Apr 7, 2021Updated 4 years ago