Optimus-He / MalwareTotalLinks
☆40Updated 2 weeks ago
Alternatives and similar repositories for MalwareTotal
Users that are interested in MalwareTotal are comparing it to the libraries listed below
Sorting:
- A curated list of malware-related papers.☆30Updated last year
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆46Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 8 months ago
- ☆11Updated last year
- Seminar 2022☆21Updated this week
- This is the official repository for VulHawk.☆71Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆53Updated last year
- ☆19Updated 10 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆71Updated 7 months ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆58Updated last year
- ☆289Updated 11 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆88Updated 2 years ago
- ☆45Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- [ICSE 2024 Industry Challenge Track] Official implementation of "ReposVul: A Repository-Level High-Quality Vulnerability Dataset".☆71Updated 7 months ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆50Updated last year
- ☆31Updated 2 years ago
- Offical Implementation for PalmTree☆144Updated last year
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆12Updated 4 months ago
- Official code of jTrans: Jump-Aware Transformer for Binary Code Similarity Detection☆161Updated 3 months ago
- ☆29Updated 9 months ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆25Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆13Updated 9 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- MPHunter can detect malicious packages without explicit knowledge.☆5Updated last year