Fa2y / Malicious-PowerShell-Dataset
Malicious PowerShell Dataset
☆15Updated last year
Alternatives and similar repositories for Malicious-PowerShell-Dataset
Users that are interested in Malicious-PowerShell-Dataset are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated last week
- malicious PowerShell script detection model☆40Updated 3 years ago
- ☆36Updated last year
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated last year
- Embed an executable as a PE resource, drops and launches it in runtime.☆59Updated 3 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year
- Official GDG Algiers CTF 2022 Writeups☆41Updated 2 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆91Updated this week
- ☆15Updated 3 years ago
- ☆10Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆325Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆241Updated 3 years ago
- ☆32Updated 3 months ago
- Malware Sandboxes & Malware Source☆93Updated 8 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆25Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆223Updated last year
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆37Updated 7 years ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆117Updated 2 weeks ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆168Updated 4 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 4 years ago
- Malware detector and classifier based on static analysis of PE executables☆9Updated last year
- GreyCTF 2022 challenge source and solution☆17Updated 2 years ago
- writeups for Capture The Flag Competitions☆16Updated 2 years ago
- ☆31Updated 4 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Updated 3 years ago
- CTF challenges designed and implemented in machine learning applications☆148Updated 8 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago