☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Pesidious
Users that are interested in Pesidious are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆173Oct 1, 2020Updated 5 years ago
- Codes for AICS'2019 challenge problem☆22Oct 13, 2019Updated 6 years ago
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- ☆13Aug 31, 2024Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago
- Jupyter notebooks for the book "Deep Learning with Python"☆11Aug 24, 2020Updated 5 years ago
- This is a sample implementation of "Robust Graph Convolutional Networks Against Adversarial Attacks", KDD 2019.☆10Dec 8, 2020Updated 5 years ago
- ☆23Jan 18, 2018Updated 8 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- ☆12Oct 29, 2018Updated 7 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago
- Permutation Equivariant Lorentz Invariant/Covariant Aggregator Network☆13Oct 28, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- SM4的优化实现,比官网上的实现快5-6倍☆13May 29, 2019Updated 6 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆245Nov 27, 2025Updated 3 months ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Web-based terminal emulator for docker containers☆21Mar 21, 2017Updated 9 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Joern Workshops☆32Jan 16, 2025Updated last year
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Lists a public S3 bucket☆13Oct 17, 2015Updated 10 years ago
- 设计并实现一个基于UI自动化、接口自动化、PO模式、数据驱动、关键字驱动、持续集成与持续发布、图像识别等技术的自动化测试框架。本框架选用 Selenium+Requests+pytest框架作为控制层进行逻辑验证,YAML作 为持久层进行测试数据的存储,利用Logging 埋…☆38Apr 14, 2024Updated last year