☆114Aug 22, 2025Updated 8 months ago
Alternatives and similar repositories for EMBER2024
Users that are interested in EMBER2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Jun 11, 2025Updated 11 months ago
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆42Apr 24, 2023Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 3 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 7 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆107Apr 23, 2026Updated 3 weeks ago
- ☆27Feb 9, 2023Updated 3 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 7 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Dumping LSA secrets: a story about task decorrelation☆15Jul 9, 2024Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆704Apr 7, 2021Updated 5 years ago
- ☆13Mar 12, 2026Updated 2 months ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- ☆19Aug 16, 2021Updated 4 years ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆16Oct 9, 2023Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆18Dec 12, 2023Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Your Skyfall Infrastructure Pack☆100Apr 10, 2026Updated last month
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- ☆50Mar 10, 2016Updated 10 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 11 months ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Live malware samples and database, daily update.☆36Apr 29, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- ☆17Apr 17, 2026Updated last month
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated 2 years ago
- Automatically exported from code.google.com/p/jbirch☆12Sep 6, 2022Updated 3 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆62Mar 17, 2025Updated last year
- A collection of position independent coding resources☆114Nov 15, 2025Updated 6 months ago