☆12Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for MAGIC
Users that are interested in MAGIC are comparing it to the libraries listed below
Sorting:
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Jan 10, 2022Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆43Aug 6, 2021Updated 4 years ago
- Lite version of LibRadar☆43Apr 8, 2023Updated 2 years ago
- PHP ASP 一句话木马,过狗一句话,附带PHP ASP 扫描器,扫描本地文件可疑代码☆10Aug 6, 2019Updated 6 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- A text-to-network representation and semantic parsing toolkit.☆11Nov 11, 2019Updated 6 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Aug 2, 2021Updated 4 years ago
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- 一个XGNN实现过程☆12Apr 20, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- ☆27Sep 20, 2025Updated 5 months ago
- Deep neural networks for voice conversion (voice style transfer) in Tensorflow☆15Oct 5, 2018Updated 7 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- MIPS 汇编器☆10May 17, 2018Updated 7 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Test cases for MIPS CPU implementation☆12Dec 26, 2019Updated 6 years ago
- Mapping of Android permissions and corresponding methods that require those permissions.☆14Oct 30, 2015Updated 10 years ago
- 基于Vue2+Django+LogisticRegressionCV,KDD-CUP99的网络入侵检测☆14Apr 6, 2022Updated 3 years ago
- ☆13Mar 24, 2017Updated 8 years ago
- 重庆大学国创创业组优秀项目-笑递☆10Feb 15, 2023Updated 3 years ago
- 强网杯2021 线上赛 HarderXSS 赛题及WP☆13Jun 17, 2021Updated 4 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- Detect the colors of tongue☆14Apr 30, 2019Updated 6 years ago
- DEEP INTERPRETABLE ARCHITECTURE FOR PLANT DISEASES CLASSIFICATION☆17Jun 13, 2020Updated 5 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- Technology, papers, products and other documents related to large language models and large language model security☆17Mar 29, 2024Updated last year
- ☆17Nov 12, 2019Updated 6 years ago
- malware classify 第三届『阿里云安全算法挑战赛』源码☆16Sep 29, 2018Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Repository for " Integrating User Representation Learning and Multiscale Modeling: A Hierarchical Framework for Information Diffusion".☆15Aug 10, 2020Updated 5 years ago