A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model to classify the converted malware image and identify the malware family it belongs to.
☆37Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for malware-image-detection
Users that are interested in malware-image-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆43Jul 19, 2023Updated 2 years ago
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 3 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆42Apr 24, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- APK black-box obfuscator for my Master's project☆14May 2, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)☆32Apr 1, 2025Updated last year
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆19Jan 20, 2021Updated 5 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆16Oct 9, 2023Updated 2 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- the good ol days when you used to post basic ML shit and your repo gets starred enough times to doubt your career choices☆17Dec 17, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 基于卷积神经网络的恶意软件检测方法☆60May 21, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆35Jan 9, 2023Updated 3 years ago
- 记录自己2024秋招的过程☆15Dec 11, 2023Updated 2 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆74Nov 10, 2019Updated 6 years ago
- Datasheets of Ingenic SoCs. Distribute as you want!☆22Sep 16, 2024Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- An attempt at simulating an ecosystem in a procedurally generated world using Unity☆30Sep 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hactivation via MobileGestalt POC☆31Nov 15, 2025Updated 5 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 9 months ago
- ☆26Apr 18, 2019Updated 7 years ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆46Jun 12, 2024Updated last year
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 4 years ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- ☆58Mar 9, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Site do Manifesto Tech em Jekyll☆20Jun 21, 2023Updated 2 years ago
- ☆19Jun 19, 2025Updated 10 months ago
- This is a PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆23Jul 21, 2025Updated 9 months ago
- ☆27May 27, 2020Updated 5 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 4 months ago