Anti-Virus research on using Heuristics and GA's to evolve and detect new polymorphic virus signatures
☆37May 5, 2014Updated 11 years ago
Alternatives and similar repositories for Hybrid-Genetic-Algorithm
Users that are interested in Hybrid-Genetic-Algorithm are comparing it to the libraries listed below
Sorting:
- A Windows memory instrumentation tool to track memory allocations and deallocations for long-running applications.☆14Jul 22, 2020Updated 5 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- A C/C++ library to parse Windows portable executables written with speed and stability in mind.☆67Feb 17, 2015Updated 11 years ago
- CDCL(Crypto) SAT solver for cryptanalysis problems☆11Mar 5, 2021Updated 5 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- ☆12May 30, 2019Updated 6 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Demonstrates how to use meshtext with bevy.☆10Jan 17, 2026Updated last month
- This application scans all the processes running on your Android Machine and will kill any malicious process. Done by Matt Khazaeli☆10Dec 4, 2016Updated 9 years ago
- Unofficial mirror of libdatrie from http://linux.thai.net/svn/software/datrie/☆10Jul 20, 2016Updated 9 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Practical security policy enforcement for Android apps via bytecode rewriting and in-place reference monitor☆39Jan 18, 2015Updated 11 years ago
- This repository contains a tutorial on how to build roll_up with☆10Mar 9, 2019Updated 6 years ago
- ☆18Jan 15, 2026Updated last month
- A simple intermediate language for generating EVM bytecode.☆13Oct 17, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Nim implementation of Simple Serialize (SSZ) serialization and merkleization☆10Feb 24, 2026Updated last week
- ☆14Apr 4, 2024Updated last year
- Simple implementation of CoveringLSH☆10Jan 22, 2016Updated 10 years ago
- make a LLVM Toy RISC-V backend step by step☆12Feb 28, 2024Updated 2 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- PROVED (PRocess mining OVer uncErtain Data) is a library of functionalities to perform process mining on uncertain event data.☆12Jan 12, 2023Updated 3 years ago
- ☆14Apr 4, 2019Updated 6 years ago
- Game servers running on Kubernetes☆12Apr 28, 2025Updated 10 months ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Android APK Crawler☆10Nov 8, 2017Updated 8 years ago
- Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.g…☆12Dec 24, 2019Updated 6 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆12Aug 12, 2024Updated last year
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆49Feb 26, 2026Updated last week
- ☆10Oct 13, 2020Updated 5 years ago