A Malware Classifier with PyTorch
☆26Jan 7, 2019Updated 7 years ago
Alternatives and similar repositories for Malware-classifier-PyTorch
Users that are interested in Malware-classifier-PyTorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- 👾 Malware Classification using Deep Learning and Cuckoo Sandbox☆14Jun 18, 2022Updated 3 years ago
- A Deep Learning Model for detecting Malware Applications☆14Aug 3, 2025Updated 8 months ago
- android-malware-classification using machine learning algorithms☆11Aug 17, 2020Updated 5 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 基于xposed的app合规检测模块☆12Oct 15, 2021Updated 4 years ago
- 提取安卓软件的n-gram特征☆24Aug 5, 2018Updated 7 years ago
- Some files which I want to share☆14May 29, 2024Updated last year
- Android malware detection using static and dynamic analysis☆40Apr 16, 2019Updated 6 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- 📚 Enjoy Learning.☆10Jun 6, 2019Updated 6 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆32Feb 13, 2024Updated 2 years ago
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 8 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- A PyTorch implementation of Temporal Generative Adversarial Nets with Singular Value Clipping☆11Nov 22, 2017Updated 8 years ago
- ☆12May 30, 2019Updated 6 years ago
- Adversarially Learned Inference implemented with Keras2☆12Aug 1, 2019Updated 6 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- The project is to recognize spoofing attack of faces using a normal flat camera without any extra sensors (such as depth, IR).☆10Jul 25, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Easily optimize generic performance metrics in differentiable learning.☆18Jun 6, 2020Updated 5 years ago
- Android malware classification using both .java files and .so files☆11Jan 19, 2019Updated 7 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Unofficial chainer implementation of 'Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks' [Zhu+, ICCV2017]☆13Mar 19, 2018Updated 8 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Bidirectional Encoder Representations from Transformers (BERT) transfer learning for named entity recognition and de-identification of se…☆10Aug 3, 2019Updated 6 years ago
- Dataset and Code for our CVPR'18 paper ST-CGAN: "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detectio…☆13Apr 17, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generative Adversarial Networks in Knet☆13Jul 3, 2019Updated 6 years ago
- Implementation of (2014) Explaining and Harnessing Adversarial Examples.☆11Jul 30, 2020Updated 5 years ago
- Replaceable Representation Learning with Generative Adversarial Networks☆11Aug 31, 2017Updated 8 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- Material de la charla "The bad guys in AI - atacando sistemas de machine learning"☆16Nov 22, 2022Updated 3 years ago
- A Practical Deep Learning-based Android Malware Detection System☆15Nov 4, 2022Updated 3 years ago