avast / avast-ctu-cape-dataset
☆29Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for avast-ctu-cape-dataset
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 4 years ago
- ☆57Updated 3 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆16Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆83Updated 5 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆16Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 3 months ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆21Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆30Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- Modular malware analysis artifact collection and correlation framework☆52Updated 6 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- YARA Language Server☆68Updated this week
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 weeks ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 5 months ago
- ☆96Updated 4 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆11Updated this week
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆26Updated last year
- A malware dataset curation tool which helps identify packed samples.☆29Updated 6 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Robust Automated Malware Unpacker☆84Updated last year
- Malware Bypass Research using Reinforcement Learning☆102Updated 7 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆86Updated 5 months ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆20Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated last month
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago