Adversarial Malware Generator Using GANs
☆54Jul 25, 2024Updated last year
Alternatives and similar repositories for MalwareGAN
Users that are interested in MalwareGAN are comparing it to the libraries listed below
Sorting:
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆172Oct 1, 2020Updated 5 years ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆26Jul 4, 2022Updated 3 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 10 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 4 months ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Tools to install w3af as a Python module☆10Jul 24, 2015Updated 10 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- Detect DDoS attack network traffic from PCAP file using machine learning.☆15Oct 5, 2020Updated 5 years ago
- Official Website of Viral Tool malware generator☆15Mar 24, 2020Updated 5 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆111Jul 25, 2024Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 10 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- Compare two binary files☆26Mar 17, 2021Updated 4 years ago
- 提取安卓软件的n-gram特征☆24Aug 5, 2018Updated 7 years ago
- A Federated Learning based Android Malware Classification System☆28Feb 15, 2024Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Sep 17, 2025Updated 5 months ago
- Identifying and Explaining Similarities in Android Apps☆28Jul 28, 2018Updated 7 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- (Relocated) 3d weaponry from across the globe☆10Jan 24, 2021Updated 5 years ago
- ☆32Feb 1, 2019Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆38Jan 26, 2026Updated last month
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- Dump certificates from PE files in different formats☆38Dec 25, 2023Updated 2 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- ☆11Jan 11, 2022Updated 4 years ago