S-Abdelnabi / VisualPhishNetLinks
☆28Updated 3 years ago
Alternatives and similar repositories for VisualPhishNet
Users that are interested in VisualPhishNet are comparing it to the libraries listed below
Sorting:
- Modular static malicious JavaScript detection system☆73Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆218Updated this week
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆167Updated 4 years ago
- Dataset with labeled benign and malicious files 🗃️☆138Updated 2 years ago
- Implementations of 3 phishing detection and identification baselines☆19Updated 10 months ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆237Updated 2 weeks ago
- Malware Bypass Research using Reinforcement Learning☆106Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆129Updated 2 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- ☆36Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆85Updated last year
- A Python library for Secure and Explainable Machine Learning☆189Updated 3 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆17Updated last month
- Discovering Malicious Functionality through Binary Reconstruction☆58Updated 4 years ago
- IoT Security Reading List☆63Updated 5 years ago
- A logic-based enterprise network security analyzer☆131Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆41Updated 6 months ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- ☆82Updated 2 years ago
- ☆24Updated last year
- This project contains files for cyber security☆36Updated 6 years ago