MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armed bandit (MAB) problem, by treating each action-content pair as an independent slot machine.
☆15Nov 24, 2021Updated 4 years ago
Alternatives and similar repositories for MAB-malware
Users that are interested in MAB-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated 2 years ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Ansible configurations for distributed MultiScanner installations☆14Apr 11, 2019Updated 7 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆15Apr 22, 2024Updated 2 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆50Apr 13, 2026Updated last month
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- Static and Dynamic Android App analyzer☆24Dec 22, 2022Updated 3 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- Android Security☆29Mar 14, 2014Updated 12 years ago
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BiasFinder | IEEE TSE | Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems☆11Jan 18, 2022Updated 4 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆246Nov 27, 2025Updated 5 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆84Dec 10, 2024Updated last year
- ☆10Nov 13, 2022Updated 3 years ago
- 🌟 SwarmAgent: A framework for simulating social group dynamics using multi-agent collaboration, aiding insights into collective behavior…☆13Dec 5, 2023Updated 2 years ago
- Android Al-Khaser☆14Dec 12, 2023Updated 2 years ago
- Fork自MbedTLS,增加商用密码算法(SM2/SM3/SM4)和PFX解析。☆28Mar 20, 2023Updated 3 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A sleepy cron☆13Nov 8, 2017Updated 8 years ago
- The memfs package is an in memory filesystem for go.☆15Feb 24, 2026Updated 2 months ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated 2 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- This script automates the process of refreshing pseudocode, renaming symbols, and saving the updated IDA database for all functions in a …☆19Feb 27, 2025Updated last year
- White-box Fairness Testing through Adversarial Sampling☆14Apr 16, 2021Updated 5 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆32Feb 13, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆30Dec 6, 2023Updated 2 years ago
- Improving Machine Translation Systems via Isotopic Replacement☆12Apr 14, 2023Updated 3 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆96Nov 1, 2018Updated 7 years ago
- 《恶意代码分析实战》实验的个人题解:https://hansimov.gitbook.io/malware-analysis/☆11Nov 14, 2020Updated 5 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- CCF推荐会议论文的获取和推送☆17Jun 3, 2024Updated last year
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆20Sep 1, 2025Updated 8 months ago