☆10Jun 16, 2022Updated 3 years ago
Alternatives and similar repositories for pe_parser
Users that are interested in pe_parser are comparing it to the libraries listed below
Sorting:
- ☆28Oct 21, 2020Updated 5 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- IDA Plugin - GraphSlick☆22Dec 25, 2018Updated 7 years ago
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆29Feb 3, 2026Updated last month
- Transformer Neural Network for Dynamic Malware Detection☆39Mar 5, 2026Updated 2 weeks ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- Graphical and minimalistic hex editor.☆13Nov 4, 2021Updated 4 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- Ultimate WebAssembly Virtual Machine 2☆11Mar 13, 2026Updated last week
- The Simulation Manager is a library for enabling reproducible scientific simulations.☆12May 1, 2023Updated 2 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆49Jan 10, 2022Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆39Aug 8, 2024Updated last year
- A simulator for large energy-aware fog computing environments 🌱☆10Jul 8, 2021Updated 4 years ago
- A simple cross-platform script for encoding any binary file into a lossless PNG.☆17Aug 12, 2024Updated last year
- Automatically exported from code.google.com/p/elfesteem☆35Feb 27, 2019Updated 7 years ago
- ☆13Nov 3, 2025Updated 4 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- ☆29Nov 10, 2016Updated 9 years ago
- ☆19Aug 10, 2024Updated last year