☆16Aug 22, 2019Updated 6 years ago
Alternatives and similar repositories for PackingData
Users that are interested in PackingData are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dataset of packed PE samples☆43Jan 24, 2026Updated 2 months ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆29Dec 6, 2023Updated 2 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆22Jan 26, 2025Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python implementation of the Packed Executable iDentifier (PEiD)☆144May 15, 2024Updated last year
- ☆12Aug 4, 2018Updated 7 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆84Feb 20, 2026Updated last month
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆14Mar 28, 2018Updated 8 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆29Dec 28, 2022Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- 基于PIn动态插桩框架的函数-循环嵌套关系分析工具:function-loop call graph profiler using Pin (Unofficial implementation of paper: Identifying Potential Parallel…☆13Sep 6, 2019Updated 6 years ago
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- ☆22Jun 1, 2020Updated 5 years ago
- ctfwriteup☆25Mar 27, 2019Updated 7 years ago
- A small java library to interface with the SatoChip hardware wallet☆11Feb 28, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Writeups to Crypto Challenges in CTFs☆41Dec 9, 2018Updated 7 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆18Mar 14, 2025Updated last year
- Dlib compiled wheels for Python on Windows X64☆15May 9, 2024Updated last year
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 6 months ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- iOS Snapchat parser for chats and cached files☆21Aug 25, 2022Updated 3 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆19May 28, 2021Updated 4 years ago
- A template for writing a nice master thesis dissertation with LaTeX☆14Jun 17, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Main repository for Lag and Crash 4.0☆13Apr 10, 2024Updated 2 years ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆57Updated this week
- A yara based MCP Server☆22Updated this week
- Quickly deploy CAPEv2 Sandbox service in Docker☆19Nov 12, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Mar 21, 2026Updated 2 weeks ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago