🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.(“2015微软恶意软件分类挑战赛” - 使用机器学习基于Windows PE结构、反汇编和机器代码对恶意软件进行分类。)
☆32Feb 13, 2024Updated 2 years ago
Alternatives and similar repositories for Microsoft-Malware-Classification
Users that are interested in Microsoft-Malware-Classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- 🪲 A list of malware and benign datasets for malware research☆39Jan 31, 2026Updated 3 months ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- ☆13Aug 31, 2024Updated last year
- Detecting Malware in PE files☆28Aug 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Aug 22, 2019Updated 6 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆93Dec 2, 2022Updated 3 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆11Jun 7, 2022Updated 3 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆94Nov 1, 2018Updated 7 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 6 months ago
- Dataset with labeled benign and malicious files 🗃️☆154Jul 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆11Jan 16, 2018Updated 8 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 8 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆15Nov 24, 2021Updated 4 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 months ago
- Adversarial Malware Generator Using GANs☆55Jul 25, 2024Updated last year
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆18Oct 24, 2025Updated 6 months ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆30Aug 20, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Follow your favorite news letters and keep an 👀 on the latest technologies news.☆13Mar 17, 2026Updated last month
- Create different graphs from Android DEX bytecode to get insight in the code structure.☆19Jan 20, 2021Updated 5 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- ☆39Aug 8, 2024Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆699Apr 7, 2021Updated 5 years ago
- One script to create a permission-based dataset of android applications for your next ML Malware Detection gizmo.☆18Dec 1, 2022Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Jupyter notebooks for the book "Deep Learning with Python"☆11Aug 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 6 years ago
- This is a sample implementation of "Robust Graph Convolutional Networks Against Adversarial Attacks", KDD 2019.☆10Dec 8, 2020Updated 5 years ago
- ☆29Dec 28, 2022Updated 3 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- This project fulfills the requirements for the mid-term project of DSCI-6015 AI and CyberSecurity, instructed by Professor Vahid Behzadan…☆19Apr 4, 2024Updated 2 years ago
- 基于最新版本的thinkphp6.0以上底层编写的一整套纯净版后台,拥有前后端分离器,内置一键快速CURD命令,kbuilder快速构建器[一个方法增删改查],插件管理模块,高级视觉扁平化后台界面[独一的风格]☆14Oct 10, 2020Updated 5 years ago
- ☆23Jan 18, 2018Updated 8 years ago