converting malware .bytes file to image
☆10Apr 19, 2019Updated 6 years ago
Alternatives and similar repositories for convert_malware_bytes_to_img
Users that are interested in convert_malware_bytes_to_img are comparing it to the libraries listed below
Sorting:
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- Launch machine learning models into production using flask☆12Aug 11, 2022Updated 3 years ago
- OS Project: Sleeping Teaching Assistant using mutex locks and semaphores.☆10Mar 14, 2020Updated 5 years ago
- 京东评论,情感分析,LDA,决策树,评论爬取,Python,emotional analysis of e-commerce comments☆13May 14, 2023Updated 2 years ago
- Secure Federated Learning Framework with Encryption Aggregation and Integer Encoding Method.☆10Jul 1, 2024Updated last year
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/pentest-bookmarks☆12Aug 1, 2015Updated 10 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- A full-stack web application for visualizing force directed graphs with Neo4j and D3.js.☆15Apr 8, 2023Updated 2 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- 数据结构——校园导航系统☆10Apr 17, 2015Updated 10 years ago
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 3 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Open source incident management and response platform.☆14Mar 16, 2018Updated 7 years ago
- LangGraphRAG: A terminal-based Retrieval-Augmented Generation system using LangGraph. Features include message history caching, query tra…☆15Jul 13, 2024Updated last year
- ☆14Nov 27, 2022Updated 3 years ago
- This repository is about transferring the secure data from one computer to another with the help of socket programming using client-serve…☆12Mar 31, 2022Updated 3 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- Deep learning malware detection system using the EMBER dataset☆11Nov 22, 2024Updated last year
- Implements FCFS, SJF(Preemptive), Round-Robin☆15Oct 5, 2020Updated 5 years ago
- 简单的一个口罩识别检测算法☆10Mar 2, 2020Updated 6 years ago
- Rewrite of Kodos regex editor using Qt4☆18Jun 19, 2025Updated 8 months ago
- Terraform scripts that create a honey pot within AWS☆15Jun 7, 2024Updated last year
- Algorithms implemented in Google Colab.☆12Nov 2, 2022Updated 3 years ago
- Malware analysis using Naive Bayes ML classfier☆11Sep 9, 2019Updated 6 years ago
- ☆15Jul 28, 2021Updated 4 years ago
- ☆14Feb 9, 2018Updated 8 years ago
- Mybatis实践练习☆11Jun 21, 2022Updated 3 years ago
- Autonomously buy GPUs from Newegg as soon as they become available☆11Aug 5, 2025Updated 7 months ago
- Packer and Vagrant configurations for Kali Linux☆14Jun 26, 2021Updated 4 years ago
- Using DCGANs to learn useful representations during the adversarial training process and using the learned features to classify images wi…☆12Apr 24, 2017Updated 8 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Kumpulan pengantar pelbagai bahasa pemrograman.☆13Oct 31, 2023Updated 2 years ago
- BGPmon☆17Feb 5, 2014Updated 12 years ago
- Simple but complete APK signing tool.☆29Feb 6, 2026Updated 3 weeks ago