Malware analysis using Naive Bayes ML classfier
☆11Sep 9, 2019Updated 6 years ago
Alternatives and similar repositories for ml-malware-analysis
Users that are interested in ml-malware-analysis are comparing it to the libraries listed below
Sorting:
- 论文“node2vec: Scalable Feature Learning for Networks”实验部分☆10Jan 9, 2018Updated 8 years ago
- OS Project: Sleeping Teaching Assistant using mutex locks and semaphores.☆10Mar 14, 2020Updated 5 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- 京东评论,情感分析,LDA,决策树,评论爬取,Python,emotional analysis of e-commerce comments☆13May 14, 2023Updated 2 years ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- RISCV lock-step checker based on Spike☆14Feb 20, 2026Updated last week
- This repository contains the code snippets used in "LLM Prompt Engineering For Developers"☆12Apr 22, 2024Updated last year
- 数据结构——校园导航系统☆10Apr 17, 2015Updated 10 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- This repository is about transferring the secure data from one computer to another with the help of socket programming using client-serve…☆12Mar 31, 2022Updated 3 years ago
- 简单的一个口罩识别检测算法☆10Mar 2, 2020Updated 6 years ago
- Implements FCFS, SJF(Preemptive), Round-Robin☆15Oct 5, 2020Updated 5 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- Dockerising a full Matrix server with Element (Riot) messaging, coTURN NAT traversal and Traefik(v2 / v3) proxy on RancherOS and Digital …☆17Sep 27, 2024Updated last year
- Medium Article☆11May 15, 2021Updated 4 years ago
- Applied Computational Thinking with Python Second Edition, Published by Packt☆14Updated this week
- Mybatis实践练习☆11Jun 21, 2022Updated 3 years ago
- ☆15Oct 7, 2016Updated 9 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 6 years ago
- upx变种☆15Aug 2, 2017Updated 8 years ago
- svm 情感分析☆16Jun 28, 2018Updated 7 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- Simple but complete APK signing tool.☆29Feb 6, 2026Updated 3 weeks ago
- TCP Network Port Scanner written in Go, nmap style.☆19Mar 7, 2020Updated 5 years ago
- ☆16Dec 30, 2023Updated 2 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- 👾 Malware Classification using Deep Learning and Cuckoo Sandbox☆14Jun 18, 2022Updated 3 years ago
- to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.☆14Jan 13, 2022Updated 4 years ago
- AWS DevOps Simplified by Packt Publishing☆15Jan 24, 2025Updated last year
- ☆18Jun 10, 2012Updated 13 years ago
- 内核crash分析☆22Oct 5, 2023Updated 2 years ago
- Collection of NLP Project and Data Analysis☆15Dec 5, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago