EdenShuker / Malware-DetectionView external linksLinks
☆13Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for Malware-Detection
Users that are interested in Malware-Detection are comparing it to the libraries listed below
Sorting:
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- ☆31Aug 26, 2015Updated 10 years ago
- Malware Detection and Classification Using Machine Learning☆344Jun 5, 2017Updated 8 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 6 years ago
- A collection of Linux Malware Detection projects (research paper implementations) done by me.☆11Jan 6, 2019Updated 7 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- Java ClassLoader for Nashorn with Maven support. Allows to define any Java dependencies directly in scripts.☆13Oct 22, 2019Updated 6 years ago
- Minitorch Self-Study Guide (SAIA)☆11Oct 9, 2022Updated 3 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Simply C program slicing tool in C☆10Jun 19, 2015Updated 10 years ago
- Prioritized Sequence Experience Replay☆10Aug 16, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆10Jan 2, 2020Updated 6 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 6 years ago
- Bitcoin mining proxy☆18Dec 2, 2012Updated 13 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Demonstrating the usage of FGYM: A Toolkit for benchmarking FPGA-accelerated Reinforcement Learning☆13Aug 12, 2021Updated 4 years ago
- Reading list for multimodal sequence learning☆14Sep 4, 2023Updated 2 years ago
- Get a company's financials and stock information using a simple and intuitive API☆12Dec 9, 2022Updated 3 years ago
- Version 3.0.0 Pytorch implementations of DQN, DDQN, DDPG, SAC, Discrete SAC. With more features :)☆12Feb 16, 2023Updated 2 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- ☆54Sep 1, 2021Updated 4 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 8 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- init☆13Dec 4, 2024Updated last year
- ☆15Oct 24, 2017Updated 8 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,124Nov 22, 2024Updated last year