Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification
☆16Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for malware-classification
Users that are interested in malware-classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆43Jul 19, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Transformer Neural Network for Dynamic Malware Detection☆40Mar 5, 2026Updated last month
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆17Jul 17, 2021Updated 4 years ago
- 基于PIn动态插桩框架的函数-循环嵌套关系分析工具:function-loop call graph profiler using Pin (Unofficial implementation of paper: Identifying Potential Parallel…☆13Sep 6, 2019Updated 6 years ago
- ☆11Jun 2, 2016Updated 9 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- ☆99Aug 22, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆17Jan 28, 2026Updated 2 months ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Dlib compiled wheels for Python on Windows X64☆15May 9, 2024Updated last year
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 10 months ago
- ☆26Jul 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆29Dec 6, 2023Updated 2 years ago
- This is a repository for the LinkedIn Learning course Virtualization with KVM and Qemu☆19Jan 23, 2023Updated 3 years ago
- Windows Event Log viewer and analyzer☆19Nov 13, 2024Updated last year
- Quickly deploy CAPEv2 Sandbox service in Docker☆19Nov 12, 2024Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 学生运动会管理系统☆12Jun 26, 2021Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- A small threat model for a smart home☆19Oct 8, 2019Updated 6 years ago
- KEVLAR memory defenses.☆18Mar 19, 2025Updated last year
- The code repository for AMR guided joint information extraction model (NAACL-2021).☆37Apr 10, 2022Updated 4 years ago
- A VS Code extension for document and book proofreading based on LLM services☆19Updated this week
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago