Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification
☆17Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for malware-classification
Users that are interested in malware-classification are comparing it to the libraries listed below
Sorting:
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆43Jul 19, 2023Updated 2 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- Transformer Neural Network for Dynamic Malware Detection☆39Mar 5, 2026Updated 2 weeks ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- ☆11Jun 2, 2016Updated 9 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- This project contains datasets for Cross Site Scripting (XSS), SQL, and LDAP injections. The project also contains the Matlab code for cr…☆19Dec 18, 2020Updated 5 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- 我的开源:讲解anything☆20Nov 7, 2020Updated 5 years ago
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- ☆15Sep 13, 2025Updated 6 months ago
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 9 months ago
- ☆26Jul 6, 2023Updated 2 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Convert executable binary file into RGB or Greyscale png image format. Repsent 8 bit binary values as pixel and create image from these. …☆57Oct 3, 2023Updated 2 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆36Oct 6, 2022Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆19May 28, 2021Updated 4 years ago
- This is a repository for the LinkedIn Learning course Virtualization with KVM and Qemu☆19Jan 23, 2023Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- A small threat model for a smart home☆18Oct 8, 2019Updated 6 years ago
- Validation of interoperability of products compliant with OMG DDS-SECURITY standard.☆16Jul 30, 2024Updated last year
- KEVLAR memory defenses.☆18Mar 19, 2025Updated last year
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated 3 months ago