S-Abdelnabi / VisualPhishNetLinks
☆26Updated 3 years ago
Alternatives and similar repositories for VisualPhishNet
Users that are interested in VisualPhishNet are comparing it to the libraries listed below
Sorting:
- Malware Classification using Machine learning☆73Updated 8 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆229Updated last month
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated 11 months ago
- Implementations of 3 phishing detection and identification baselines☆19Updated 7 months ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆70Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆83Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- Dataset with labeled benign and malicious files 🗃️☆130Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated last month
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Updated 7 years ago
- Multi-class malware classification using Deep Learning☆78Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- ☆28Updated 5 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆126Updated 6 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- This project contains files for cyber security☆35Updated 6 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆88Updated 6 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆50Updated 6 years ago
- ☆79Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆53Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆85Updated 2 years ago