deut-erium / Mal-det-cal
Malware detector and classifier based on static analysis of PE executables
☆9Updated last year
Alternatives and similar repositories for Mal-det-cal:
Users that are interested in Mal-det-cal are comparing it to the libraries listed below
- Malware Classification and Labelling using Deep Neural Networks☆34Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Dataset of packed ELF samples☆18Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Robust Automated Malware Unpacker☆84Updated last year
- ☆45Updated 6 years ago
- Collection of Malware Lures☆23Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆13Updated 2 years ago
- ☆14Updated 2 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- Course Material☆19Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆33Updated last year
- ☆24Updated last year
- Educational ransomware for evaluating ransomware detection tools☆8Updated last year
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆112Updated last year
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 3 months ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆100Updated 4 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆20Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago
- ☆44Updated 3 years ago
- The malsource dataset☆10Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆82Updated 11 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- Leveraging patch diffing to discover new vulnerabilities☆109Updated 2 months ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago