Maff1t / JuanLesPIN-Public
Research tool able to detect and mitigate evasion techniques used by malware in-the-wild
☆11Updated 2 years ago
Alternatives and similar repositories for JuanLesPIN-Public
Users that are interested in JuanLesPIN-Public are comparing it to the libraries listed below
Sorting:
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆172Updated last year
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- ☆58Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- ☆79Updated 5 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated 2 weeks ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆234Updated last month
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆24Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆63Updated 2 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- scripts/plugins for IDA Pro☆173Updated 4 months ago
- ☆15Updated 3 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last month
- capemon: CAPE's monitor☆116Updated this week
- ☆226Updated 2 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago