Maff1t / JuanLesPIN-Public
Research tool able to detect and mitigate evasion techniques used by malware in-the-wild
☆11Updated 2 years ago
Alternatives and similar repositories for JuanLesPIN-Public:
Users that are interested in JuanLesPIN-Public are comparing it to the libraries listed below
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆172Updated last year
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆91Updated last month
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- ☆58Updated 4 years ago
- ☆79Updated 5 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆113Updated last month
- Powershell script deobfuscation using AST in Python☆65Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last week
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- capemon: CAPE's monitor☆116Updated this week
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆231Updated last week
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- Generating YARA rules based on binary code☆208Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year
- ☆22Updated 3 years ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆50Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆43Updated 2 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆24Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 3 weeks ago