A curated dataset of malware and benign Windows executable samples for malware researchers
β54Feb 17, 2026Updated last month
Alternatives and similar repositories for MaleX
Users that are interested in MaleX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β26Apr 18, 2019Updated 6 years ago
- Dataset with labeled benign and malicious files ποΈβ151Jul 19, 2023Updated 2 years ago
- β11Jan 5, 2022Updated 4 years ago
- β28Oct 21, 2020Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challengeβ18Nov 28, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Malware Classification using Machine learningβ77Nov 9, 2024Updated last year
- β27Jul 14, 2019Updated 6 years ago
- β13Dec 30, 2021Updated 4 years ago
- Transfer Learning for Image-Based Malware Classificationβ47Mar 1, 2022Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attackβ26May 31, 2016Updated 9 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)β22Mar 17, 2022Updated 4 years ago
- β18Mar 15, 2024Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon β¦β92Mar 31, 2024Updated last year
- Multi-class malware classification using Deep Learningβ76Oct 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdfβ19May 21, 2018Updated 7 years ago
- β164Oct 27, 2022Updated 3 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calβ¦β259Nov 22, 2021Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.β75Sep 2, 2022Updated 3 years ago
- β13Aug 31, 2024Updated last year
- β11Feb 8, 2026Updated last month
- SpyCore - Windows Malicious FIle Scanner (Distributes)β14Jun 10, 2023Updated 2 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusingβ¦β24Jul 25, 2023Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Pritβ¦β39Aug 2, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- β12Feb 8, 2021Updated 5 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Securβ¦β11Aug 5, 2019Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"β39Oct 5, 2023Updated 2 years ago
- Sysmon Tools for PowerShellβ12Aug 17, 2018Updated 7 years ago
- β10Dec 18, 2023Updated 2 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM archβ¦β11Jul 30, 2020Updated 5 years ago
- A large-scale database of malicious software imagesβ51Aug 27, 2021Updated 4 years ago
- Framework for Adversarial Malware Evaluation.β35Mar 31, 2025Updated 11 months ago
- string encryption in Nimβ19Jun 15, 2024Updated last year
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- β80Dec 6, 2019Updated 6 years ago
- A Semantics-Enhanced Learnable Vulnerability Detectorβ44Jun 29, 2022Updated 3 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automatiβ¦β29Aug 17, 2022Updated 3 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classificationβ59Nov 5, 2025Updated 4 months ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document bringsβ¦β19Dec 23, 2020Updated 5 years ago
- PDF Malware Parserβ20Jun 3, 2016Updated 9 years ago
- Malware Bypass Research using Reinforcement Learningβ107Apr 22, 2024Updated last year