RezaPurut / convert_malware_bytes_to_imgLinks
converting malware .bytes file to image
☆10Updated 6 years ago
Alternatives and similar repositories for convert_malware_bytes_to_img
Users that are interested in convert_malware_bytes_to_img are comparing it to the libraries listed below
Sorting:
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Updated 9 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆80Updated 5 years ago
- ☆13Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆182Updated 6 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- ☆80Updated 6 years ago
- Malware Detection and Classification Using Machine Learning☆341Updated 8 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆80Updated 7 years ago
- Free Malware Training Datasets for Machine Learning☆237Updated 4 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 6 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆93Updated 3 years ago
- Malware Classification using Machine learning☆74Updated last year
- Adversarial Malware Generator Using GANs☆55Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆255Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆13Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- Automated malware unpacker☆121Updated 9 years ago
- A collection of resources for security data☆41Updated 8 years ago
- ☆97Updated 5 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- Framework for Adversarial Malware Evaluation.☆35Updated 8 months ago
- Set of tools for interacting with Malshare☆158Updated 5 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago