A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model to classify the converted malware image and identify the malware family it belongs to.
☆35Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for malware-image-detection
Users that are interested in malware-image-detection are comparing it to the libraries listed below
Sorting:
- A large-scale database of malicious software images☆51Aug 27, 2021Updated 4 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 2 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Torresmo config☆16Feb 25, 2026Updated last week
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A "Linkedin Account Manager" software built with Node.js and Cypress.☆12Jan 20, 2023Updated 3 years ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 3 months ago
- 记录自己2024秋招的过程☆15Dec 11, 2023Updated 2 years ago
- Image Classifier website with Deep Learning using Flask☆14Aug 2, 2019Updated 6 years ago
- Malware Detection using Convolutional Neural Networks☆12Mar 24, 2023Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Using a GAN to generate a new dataset☆12Sep 13, 2021Updated 4 years ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- python from scratch implementation of Neuroevolution of Augmenting Topologies☆11Jul 30, 2021Updated 4 years ago
- IoT device scanner with CVE database and many features.☆14Sep 3, 2019Updated 6 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- Xiaomi Mi8 Kali Nethunter kernel for Android 10☆16Nov 24, 2020Updated 5 years ago
- Found resources in my malware researching adventure.☆16Dec 18, 2022Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22May 4, 2024Updated last year
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Heroes of newerth scripting pack☆18Jan 21, 2023Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- Python Module for Parsing & Reverse Engineering Mach-O Executables.☆21Mar 1, 2024Updated 2 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 3 years ago
- Site do Manifesto Tech em Jekyll☆20Jun 21, 2023Updated 2 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 4 years ago
- A simple arp spoof script written with python☆14Mar 18, 2020Updated 5 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- ☆19Jun 19, 2025Updated 8 months ago