☆12Aug 4, 2018Updated 7 years ago
Alternatives and similar repositories for Malimg
Users that are interested in Malimg are comparing it to the libraries listed below
Sorting:
- ☆14Mar 28, 2018Updated 7 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Dec 1, 2024Updated last year
- Dataset of packed PE samples☆43Jan 24, 2026Updated last month
- Deadlock killer library.☆14Jun 29, 2020Updated 5 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆13Aug 28, 2021Updated 4 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Performance comparison of ClickHouse vs PostgreSQL using LLM-style query patterns on realistic aircraft tracking data☆13Aug 13, 2025Updated 6 months ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Text classification experiments using TextCNNs and Bi-attentive Classification Networks☆10Feb 18, 2019Updated 7 years ago
- Cookiecutter skeleton for minimal flask app☆10Jun 27, 2022Updated 3 years ago
- ☆10Jan 15, 2021Updated 5 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Open-source AI-powered blockchain transaction analysis☆33Jul 24, 2025Updated 7 months ago
- ☆13Aug 31, 2024Updated last year
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- FEM micromagnetic simulator☆11Feb 26, 2026Updated last week
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- Augmented AI decision framework☆27Jan 26, 2026Updated last month
- ☆10Jun 16, 2022Updated 3 years ago
- Shows CPUID features and instruction encodings used by x86/x64 binaries☆18Jan 2, 2026Updated 2 months ago
- Stack Exchange's Monitoring System☆13Nov 28, 2013Updated 12 years ago
- Complete specifications for AI-assisted development: Spec as Code, Testing as Code, Documentation as Code, and Context Engineering as Cod…☆26Feb 12, 2026Updated 3 weeks ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- Self-hostable headless QR code generator☆18Feb 5, 2026Updated last month
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago