Mayachitra-Inc / MaleXView external linksLinks
A curated dataset of malware and benign Windows executable samples for malware researchers
☆52Nov 12, 2025Updated 3 months ago
Alternatives and similar repositories for MaleX
Users that are interested in MaleX are comparing it to the libraries listed below
Sorting:
- Dataset with labeled benign and malicious files 🗃️☆149Jul 19, 2023Updated 2 years ago
- Gametech STMM MMTC Yogyakarta Game Developer Roadmap (*prototype)☆11Nov 30, 2023Updated 2 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- ☆13Dec 30, 2021Updated 4 years ago
- ☆11Updated this week
- ☆28Oct 21, 2020Updated 5 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- ☆18Mar 15, 2024Updated last year
- Fork of Koushoku.☆17Oct 9, 2023Updated 2 years ago
- A multipurpose Discord and Revolt bot providing games, images and more☆17Updated this week
- Multi-class malware classification using Deep Learning☆77Oct 3, 2020Updated 5 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆56Nov 5, 2025Updated 3 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Nov 22, 2021Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- ☆23Apr 7, 2022Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- A powerful and fully automated bot designed to help users complete various Discord tasks efficiently. The bot supports multiple quest typ…☆28Jan 28, 2026Updated 2 weeks ago
- ☆27May 27, 2020Updated 5 years ago
- ☆31Dec 5, 2024Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- Fabric Stain Detection System based on YOLO algorithm☆19Jan 28, 2025Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Free, informative IPA transcription for Lyric Diction. Transcribes in realtime and gives useful feedback.☆32Dec 23, 2025Updated last month
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 10 months ago
- Malware Data Science Reading Diary / Notes☆129May 5, 2019Updated 6 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Laravel Livewire CRUD, Laravel Livewire Example With Basic Listing, Edit, Update & Delete. Multiple File Upload with the show and delete …☆11Sep 25, 2020Updated 5 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44May 18, 2024Updated last year