bitterzzZZ / Bert-malware-classificationView external linksLinks
使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务
☆42Nov 18, 2020Updated 5 years ago
Alternatives and similar repositories for Bert-malware-classification
Users that are interested in Bert-malware-classification are comparing it to the libraries listed below
Sorting:
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- Multi-class malware classification using Deep Learning☆77Oct 3, 2020Updated 5 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- ☆22Jun 1, 2020Updated 5 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Sep 6, 2021Updated 4 years ago
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆34Dec 9, 2024Updated last year
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Oct 9, 2023Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- QRSS Plus: live QRSS grabbers from around the world☆10Updated this week
- ☆12Aug 4, 2018Updated 7 years ago
- A neural approach to malware detection in portable executables☆79Mar 20, 2023Updated 2 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆30Oct 29, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆39Oct 6, 2025Updated 4 months ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- Running Interactive Brokers gateway on Raspberry 4B and Debian 64-bit☆17Oct 14, 2025Updated 3 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆84Nov 22, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- The instant digital "Do Not Touch" sign for your Mac. Stop fingerprints and protect your expensive display with one keystroke.☆29Jan 13, 2026Updated last month
- 从0到1搭建一个商品管理系统☆11Dec 16, 2022Updated 3 years ago
- 南方科技大学图书馆LaTeX培训讲座,⬇️是讨论区☆10Sep 7, 2021Updated 4 years ago
- An Interval Tree Library☆12Dec 7, 2024Updated last year
- Control Claude Code remotely from your iPhone anywhere☆23Jul 21, 2025Updated 6 months ago
- ☆15Jun 12, 2015Updated 10 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago