Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification
☆16Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for malware-classification
Users that are interested in malware-classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆43Jul 19, 2023Updated 2 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16Aug 22, 2019Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Transformer Neural Network for Dynamic Malware Detection☆41Mar 5, 2026Updated last month
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆32Feb 13, 2024Updated 2 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- 我的开源:讲解anything☆20Nov 7, 2020Updated 5 years ago
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆17Jan 28, 2026Updated 3 months ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Dlib compiled wheels for Python on Windows X64☆15May 9, 2024Updated last year
- ☆15Sep 13, 2025Updated 7 months ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Convert executable binary file into RGB or Greyscale png image format. Repsent 8 bit binary values as pixel and create image from these. …☆57Oct 3, 2023Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆30Dec 6, 2023Updated 2 years ago
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆19May 28, 2021Updated 4 years ago
- This is a repository for the LinkedIn Learning course Virtualization with KVM and Qemu☆20Jan 23, 2023Updated 3 years ago
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆70Updated this week
- Windows Event Log viewer and analyzer☆19Nov 13, 2024Updated last year
- Quickly deploy CAPEv2 Sandbox service in Docker☆19Nov 12, 2024Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- A small threat model for a smart home☆20Oct 8, 2019Updated 6 years ago
- Validation of interoperability of products compliant with OMG DDS-SECURITY standard.☆16Jul 30, 2024Updated last year
- KEVLAR memory defenses.☆18Mar 19, 2025Updated last year
- The code repository for AMR guided joint information extraction model (NAACL-2021).☆37Apr 10, 2022Updated 4 years ago
- API per le carte HYPE e TIM Pay☆15Feb 16, 2021Updated 5 years ago
- Use BERT as the encoder and GPT2 as the decoder for machine translation.☆15Jun 3, 2021Updated 4 years ago