Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
☆77Oct 8, 2025Updated 5 months ago
Alternatives and similar repositories for MalConv2
Users that are interested in MalConv2 are comparing it to the libraries listed below
Sorting:
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- ☆80Dec 6, 2019Updated 6 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,137Nov 22, 2024Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆245Nov 27, 2025Updated 3 months ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- A neural approach to malware detection in portable executables☆81Mar 20, 2023Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆94Nov 1, 2018Updated 7 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Dataset with labeled benign and malicious files 🗃️☆150Jul 19, 2023Updated 2 years ago
- Sophos-ReversingLabs 20 million sample dataset☆692Apr 7, 2021Updated 4 years ago
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated 2 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆19Aug 16, 2021Updated 4 years ago
- ☆41Mar 9, 2026Updated last week
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Rust implementation of the LZJD algorithm (https://github.com/EdwardRaff/jLZJD)☆16Dec 24, 2023Updated 2 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Python implementation of the LZJD algorithm☆33Jul 10, 2025Updated 8 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆39Aug 8, 2024Updated last year
- ☆32Jul 22, 2022Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- ☆11Jun 15, 2022Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆44Feb 26, 2024Updated 2 years ago