Transformer Neural Network for Dynamic Malware Detection
☆39Mar 5, 2026Updated 3 weeks ago
Alternatives and similar repositories for nebula
Users that are interested in nebula are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jun 15, 2022Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 4 months ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Dec 30, 2021Updated 4 years ago
- Attack benchmark repository☆22Nov 25, 2025Updated 4 months ago
- ☆10Jun 16, 2022Updated 3 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆34Dec 9, 2024Updated last year
- ☆11Dec 17, 2024Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆32Jul 22, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- Dataset with labeled benign and malicious files 🗃️☆151Jul 19, 2023Updated 2 years ago
- A Python library for Secure and Explainable Machine Learning☆191Jun 23, 2025Updated 9 months ago
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆17Oct 9, 2023Updated 2 years ago
- Computational Memory Neural Network Compiler☆11Aug 11, 2021Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- ☆17Sep 23, 2024Updated last year
- Implementation of mixed language project compilation via Bazel platform.☆17Oct 10, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Updated this week
- ☆17May 27, 2021Updated 4 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆19Jul 15, 2024Updated last year
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- enchmarking Large Language Models' Resistance to Malicious Code☆14Dec 1, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- PE 文件病毒编写☆49Mar 1, 2020Updated 6 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago