☆98Aug 22, 2025Updated 6 months ago
Alternatives and similar repositories for EMBER2024
Users that are interested in EMBER2024 are comparing it to the libraries listed below
Sorting:
- ☆40Jun 11, 2025Updated 9 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 5 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Mar 12, 2026Updated last week
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 5 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- ☆13Mar 12, 2026Updated last week
- Sophos-ReversingLabs 20 million sample dataset☆692Apr 7, 2021Updated 4 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- ☆19Aug 16, 2021Updated 4 years ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆17Oct 9, 2023Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- Your Skyfall Infrastructure Pack☆91Jan 25, 2026Updated last month
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Live malware samples and database, daily update.☆32Apr 29, 2025Updated 10 months ago
- ☆44Feb 26, 2024Updated 2 years ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- ☆50Mar 10, 2016Updated 10 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- MLOps Attack Toolkit☆31Aug 25, 2025Updated 6 months ago
- Lnk crafting and research tools☆118Mar 4, 2026Updated 2 weeks ago
- ☆17Sep 17, 2025Updated 6 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 4 months ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated last year