Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
☆76Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for MalConv2
Users that are interested in MalConv2 are comparing it to the libraries listed below
Sorting:
- Automated Yara Rule generation using Biclustering☆77Oct 8, 2025Updated 4 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- ☆80Dec 6, 2019Updated 6 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,129Nov 22, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Dataset with labeled benign and malicious files 🗃️☆148Jul 19, 2023Updated 2 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Malware Detection using Convolutional Neural Networks☆12Mar 24, 2023Updated 2 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated last year
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- ☆39Dec 31, 2025Updated last month
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- ☆18Mar 15, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- Python implementation of the LZJD algorithm☆32Jul 10, 2025Updated 7 months ago
- Rust implementation of the LZJD algorithm (https://github.com/EdwardRaff/jLZJD)☆16Dec 24, 2023Updated 2 years ago
- ☆19Aug 16, 2021Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- ☆38Aug 8, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Nov 22, 2021Updated 4 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Mar 10, 2023Updated 2 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- ☆12Jun 24, 2017Updated 8 years ago