alrawi / badthings-tools
This repository contains dynamic and static tools for IoT malware analysis
☆20Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for badthings-tools
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 3 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- ☆14Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆57Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆83Updated 5 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆26Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆22Updated 11 months ago
- ☆22Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg …☆86Updated 5 months ago
- Dataset of packed ELF samples☆17Updated last year
- Robust Automated Malware Unpacker☆84Updated last year
- The malsource dataset☆10Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆27Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆95Updated 2 months ago
- ☆15Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Updated 3 years ago
- SAFE embeddings to match functions in yara☆100Updated 4 years ago
- IoT Security Reading List☆62Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆67Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆21Updated 4 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year