avast / avast-ctu-cape-dataset
☆36Updated last year
Alternatives and similar repositories for avast-ctu-cape-dataset
Users that are interested in avast-ctu-cape-dataset are comparing it to the libraries listed below
Sorting:
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆58Updated 4 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated last month
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆18Updated last year
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 7 months ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆44Updated 2 years ago
- Community modules for CAPE Sandbox☆96Updated last month
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated 2 weeks ago
- Powershell script deobfuscation using AST in Python☆66Updated last year
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 3 months ago
- Robust Automated Malware Unpacker☆84Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆114Updated 2 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- Dataset of packed PE samples☆34Updated 10 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated 2 weeks ago
- ☆31Updated last month
- Maco - Malware config extractor framework☆34Updated 2 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year