A Python 3 library to interact with VirusShare API v2.
☆17Aug 12, 2020Updated 5 years ago
Alternatives and similar repositories for PyVirusShare
Users that are interested in PyVirusShare are comparing it to the libraries listed below
Sorting:
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Quantum cracking encryption. Shor Algorithm.☆18Mar 14, 2025Updated last year
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- The docker image for nginx rtmp hls server.☆11Jan 6, 2021Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- suricata rules☆18Dec 26, 2024Updated last year
- Node.js server that responds to github webhook post-receive events for easy push-to-deploy☆12Dec 28, 2020Updated 5 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- ☆12Sep 29, 2019Updated 6 years ago
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- A Survey of Deep Learning Models for Structural Code Understanding☆21May 12, 2022Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Reverse engineer python exe☆16Sep 30, 2025Updated 5 months ago
- ☆17Jan 22, 2026Updated 2 months ago
- Multi-class malware classification using Deep Learning☆76Oct 3, 2020Updated 5 years ago
- ☆14Jun 27, 2020Updated 5 years ago
- Convert executable binary file into RGB or Greyscale png image format. Repsent 8 bit binary values as pixel and create image from these. …☆57Oct 3, 2023Updated 2 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- ☆25Nov 22, 2021Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Real-time Boss Face Recognition and switch the desktop to the workspace.☆26Feb 3, 2018Updated 8 years ago