Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org/pdf/1908.06750.pdf).
☆11Jul 19, 2020Updated 5 years ago
Alternatives and similar repositories for ransomware-classification
Users that are interested in ransomware-classification are comparing it to the libraries listed below
Sorting:
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- ☆15Feb 28, 2020Updated 6 years ago
- Machine Learning Ransomware Detection☆35Apr 8, 2018Updated 7 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73May 22, 2023Updated 2 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆28Aug 20, 2024Updated last year
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- This program detects all present and future ransomware in Windows file shares or local drives for Windows file servers. I created this w…☆19Dec 18, 2023Updated 2 years ago
- A python ransomware integrated with discord webhooks, fast and clean.☆15Dec 30, 2021Updated 4 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- ☆35Sep 25, 2020Updated 5 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Dataset created for the Power Line Insulators Inspection Detections☆10Jul 2, 2020Updated 5 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- 天池大数据竞赛数据集&代码☆12May 7, 2019Updated 6 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Post the latest post from your RSS Feed to your LinkedIn Profile☆12Jan 28, 2026Updated last month
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Malware Classification and Labelling using Deep Neural Networks☆41Feb 1, 2020Updated 6 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Prioritized Sequence Experience Replay☆10Aug 16, 2021Updated 4 years ago
- Examples and code demonstrations for the Deep Learning module at Durham University☆10Nov 18, 2025Updated 3 months ago
- Credentials recovery project☆13Mar 25, 2022Updated 3 years ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago