NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)
☆13Jan 20, 2022Updated 4 years ago
Alternatives and similar repositories for python_mmdt
Users that are interested in python_mmdt are comparing it to the libraries listed below
Sorting:
- ☆14May 23, 2023Updated 2 years ago
- a Machine Learning powered CSRF attacks finding tool☆27Mar 8, 2019Updated 6 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ☆13Dec 16, 2022Updated 3 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 5 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- PINTool to help analyzing malware that uses process injection☆15Jan 3, 2022Updated 4 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- 月之暗面 moonshot AI nodejs SDK typescript kimi☆12Apr 13, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- Parse Suricata rules☆13Aug 1, 2023Updated 2 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Webdriver for Chrome☆12Updated this week
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Gevent 中文入门教程文档,翻译 from sdiehl/gevent-tutorial☆10May 21, 2020Updated 5 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- A portable and efficient infrastracture for value profilers. Doc: https://vclinic.readthedocs.io/en/latest/index.html☆14Jan 22, 2026Updated last month
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago