MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armed bandit (MAB) problem, by treating each action-content pair as an independent slot machine.
☆15Nov 24, 2021Updated 4 years ago
Alternatives and similar repositories for MAB-malware
Users that are interested in MAB-malware are comparing it to the libraries listed below
Sorting:
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- ☆44Sep 4, 2025Updated 6 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- AFL fuzzing coverage CFG visualization☆31Jan 19, 2018Updated 8 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆11Oct 22, 2019Updated 6 years ago
- Parser for the mysterious Rich header generated by MSVC☆14Apr 12, 2018Updated 7 years ago
- C++ python bytecode disassembler and decompiler☆20Feb 27, 2026Updated 3 weeks ago
- A Python 3 library to interact with VirusShare API v2.☆17Aug 12, 2020Updated 5 years ago
- 黑客入门编程科普源代码合集,请点赞关注唐老师编程(今日头条,B站)☆32Oct 1, 2023Updated 2 years ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆18Dec 1, 2022Updated 3 years ago
- Ansible configurations for distributed MultiScanner installations☆14Apr 11, 2019Updated 6 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- Here is the replication of the paper Probabilistic Delta Debugging, which has been accepted by ESEC/FSE 2021. More details can be found i…☆19Aug 2, 2021Updated 4 years ago
- ☆33Sep 13, 2024Updated last year
- ☆29May 29, 2018Updated 7 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- Static and Dynamic Android App analyzer☆25Dec 22, 2022Updated 3 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- ☆16Apr 1, 2025Updated 11 months ago
- Android Security☆29Mar 14, 2014Updated 12 years ago
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 9 years ago
- Root Certificates Accepted by Sectigo's CT Logs☆23Mar 6, 2026Updated 2 weeks ago
- Modify orca-zhang/borm in order to use in PostgreSQL☆14Aug 28, 2024Updated last year
- BiasFinder | IEEE TSE | Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems☆11Jan 18, 2022Updated 4 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆245Nov 27, 2025Updated 3 months ago
- LLM-based mutation testing☆14Feb 3, 2025Updated last year
- ☆24Feb 16, 2021Updated 5 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- BERT-IMDB电影评论情感分类实战:SwanLab可视化训练☆26May 25, 2024Updated last year
- ☆10Nov 13, 2022Updated 3 years ago
- 🌟 SwarmAgent: A framework for simulating social group dynamics using multi-agent collaboration, aiding insights into collective behavior…☆13Dec 5, 2023Updated 2 years ago