Vi45en / PesidiousLinks
☆13Updated 2 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below
Sorting:
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 6 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- ☆13Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- Botnet Simulation Framework☆76Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- All in one - Malware + Analysis by Cylance☆11Updated 6 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆40Updated 3 years ago
- Simple tool to extract icons from a pe file and other useful information☆12Updated 7 years ago
- ☆25Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆10Updated 4 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- Malware samples observed in the wild from time to time☆12Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- ☆13Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago