EdwardRaff / pyLZJDLinks
Python implementation of the LZJD algorithm
☆32Updated 6 months ago
Alternatives and similar repositories for pyLZJD
Users that are interested in pyLZJD are comparing it to the libraries listed below
Sorting:
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Updated 5 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆29Updated last year
- Automated Yara Rule generation using Biclustering☆76Updated 3 months ago
- ☆10Updated 3 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆75Updated 3 months ago
- ☆80Updated 6 years ago
- A collection of RAPIDS examples for security analysts, data scientists, and engineers to quickly get started applying RAPIDS and GPU acce…☆173Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆131Updated 5 years ago
- ☆16Updated 4 years ago
- ☆18Updated 8 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Updated 6 months ago
- CP-APR Tensor Decomposition with PyTorch backend. pyCP_APR can perform non-negative Poisson Tensor Factorization on GPU, and includes an …☆18Updated 2 years ago
- ☆37Updated 7 months ago
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Updated 4 years ago
- Pytorch implementation of MalConv☆72Updated 4 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- Insider Threat Detection using Isolation Forest☆17Updated 7 years ago
- ☆161Updated 3 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- Probabilistic data structures in python http://pyprobables.readthedocs.io/en/latest/index.html☆122Updated this week
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- MalwareDB main project repo.☆16Updated 4 years ago
- NetLSD descriptors for graphs. Compare and analyze graph structure on multiple levels!☆61Updated 5 years ago
- ☆63Updated 4 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 6 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated 2 months ago