A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model to classify the converted malware image and identify the malware family it belongs to.
☆36Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for malware-image-detection
Users that are interested in malware-image-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆43Jul 19, 2023Updated 2 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- ☆28Oct 21, 2020Updated 5 years ago
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)☆32Apr 1, 2025Updated 11 months ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆17Oct 9, 2023Updated 2 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Implementation of IEEE paper: Malware Classification with Deep Convolutional Neural Networks☆17Dec 17, 2019Updated 6 years ago
- self contained mfkey tool for all 3 mfkeys☆18Sep 20, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Installation guide for bWAPP on Kali Linux, Ubuntu, and Windows.☆13Sep 23, 2024Updated last year
- 基于卷积神经网络的恶意软件检测方法☆59May 21, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- 记录自己2024秋招的过程☆15Dec 11, 2023Updated 2 years ago
- retro graphics framework☆12Jun 15, 2024Updated last year
- Xiaomi Mi8 Kali Nethunter kernel for Android 10☆16Nov 24, 2020Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Hactivation via MobileGestalt POC☆29Nov 15, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Splitwise Clone is a group expense management web app, simplifying bill splitting and tracking. Built with React and Tailwind CSS, it off…☆32Mar 16, 2025Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- A public dataset containing chord/beat annotation from a music game named 'osu!'.☆11Oct 17, 2017Updated 8 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- The Berkeley JSIM superconducting spice simulator☆14Sep 20, 2017Updated 8 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A "Linkedin Account Manager" software built with Node.js and Cypress.☆12Jan 20, 2023Updated 3 years ago
- A command line utility for searching Philippine laws and jurisprudence☆10Jul 6, 2024Updated last year
- An Entity-Relationship Diagram web editor written in Javascript with React/Redux.☆17Dec 23, 2022Updated 3 years ago
- ☆53Mar 9, 2026Updated 2 weeks ago
- ☆14Jul 23, 2024Updated last year
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Study materials for ethical hacking and cyber security☆16Jan 8, 2020Updated 6 years ago