It's a malware detection API for Windows malware utilizing Artificial Neural network.
☆19Aug 2, 2024Updated last year
Alternatives and similar repositories for Defender
Users that are interested in Defender are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 8, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆74Nov 10, 2019Updated 6 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- PDF Malware Parser☆21Jun 3, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Sep 6, 2021Updated 4 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- ☆11Mar 27, 2023Updated 3 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Codes for AICS'2019 challenge problem☆22Oct 13, 2019Updated 6 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- ☆12Jun 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- idax: IDASDK extension libraries☆25Oct 12, 2025Updated 7 months ago
- ☆12May 30, 2019Updated 6 years ago
- ☆11Feb 14, 2025Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated 2 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- VADER Reddit Sentiment analysis using Dash in python☆10Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆50Apr 13, 2026Updated last month
- 一个基于python3+flask的个人图书电影管理搜索系统☆14Nov 29, 2017Updated 8 years ago
- Anti-virus engine in Windows using VC++ 6.0 and MFC. We applied windows multithreading in virus scan method and user interface. Using MFC…☆16Oct 21, 2016Updated 9 years ago
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- 基于深度学习的恶意软件检测研究;MalConv;☆120Jun 22, 2022Updated 3 years ago
- Official Implementation of the paper "Real-time panoramic depth maps from omni-directional stereo images for 6 DoF videos in virtual real…☆24Apr 22, 2019Updated 7 years ago
- Machine Learning Intrusion Detection and Network Monitor☆14Aug 30, 2024Updated last year
- ☆39Aug 8, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Aug 4, 2018Updated 7 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 6 years ago
- ☆14May 30, 2022Updated 3 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- Keep monitoring the Sonarr and Radarr wanted list and send an search request to then every X minutes or on Wake Event, forcing an Automat…☆12Nov 23, 2023Updated 2 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- ☆13Sep 15, 2018Updated 7 years ago