S-Abdelnabi / VisualPhishNetLinks
☆30Updated 4 years ago
Alternatives and similar repositories for VisualPhishNet
Users that are interested in VisualPhishNet are comparing it to the libraries listed below
Sorting:
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated 2 months ago
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆226Updated last month
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 6 years ago
- Malware Classification using Machine learning☆76Updated last year
- Dataset with labeled benign and malicious files 🗃️☆149Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆103Updated 2 years ago
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Updated 7 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 3 years ago
- ☆27Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- NLP model and tech for cyber security tasks☆86Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Updated 6 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- ☆10Updated 3 years ago
- Drebin - NDSS 2014 Re-implementation☆106Updated 8 years ago