airlitti / COMP90018-2022-Tutorial
β8Updated 2 years ago
Related projects β
Alternatives and complementary repositories for COMP90018-2022-Tutorial
- π "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windowβ¦β18Updated 8 months ago
- Various shell code I have writtenβ16Updated 4 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converβ¦β13Updated 6 years ago
- β14Updated 6 years ago
- β11Updated 2 months ago
- Process injection tool, in order to explain how different process injection methods works and cool tricks with WINAPI.β20Updated 5 years ago
- Script which display image (ad) downloaded from the internet.β13Updated 4 years ago
- β22Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)β18Updated 2 years ago
- A malware dataset curation tool which helps identify packed samples.β29Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/systemβ10Updated 3 years ago
- The malsource datasetβ10Updated 3 years ago
- Malware classification using VirusTotal API and Python. Classified malware families are Worms, Adware, Virus, Riskware, Spyware, Keyloggeβ¦β8Updated 3 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.β30Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installerβ50Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.β38Updated 3 months ago
- AVCLASS++: Yet Another Massive Malware Labeling Toolβ13Updated 4 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".β93Updated 5 months ago
- β18Updated 3 years ago
- β30Updated 4 months ago
- All in one - Malware + Analysis by Cylanceβ11Updated 5 years ago
- TaskMgr Volatile Environment LPEβ12Updated 2 years ago
- AI Model Security Reading Notesβ35Updated 3 months ago
- A simple rootkit to hide a processβ45Updated 10 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread supportβ44Updated 7 years ago
- Enter Product Key Volatile Environment LPEβ11Updated 2 years ago
- β49Updated 4 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imaβ¦β38Updated last year
- Additional material for the malware variants identification paperβ9Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (β¦β17Updated 6 years ago