This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset and will be able to see the use of machine learning models using the dataset. We will use machine learning for detect malware.
☆13May 11, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Detection-Using-Machine-Learning
Users that are interested in Malware-Detection-Using-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Malware Detection using Convolutional Neural Networks☆12Mar 24, 2023Updated 2 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- This is a Malware Detection ML model made using Random Forest Algorithm☆39Oct 20, 2024Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- This is a termux sms booming tool☆11Aug 20, 2023Updated 2 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆15Apr 15, 2021Updated 4 years ago
- Hi There today I published a checklist of strategies on Linux Privilege Escalation by Tib3rius☆11Mar 31, 2023Updated 2 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- Code written during contests and challenges by HackTheBox. Hack The Box is an online cybersecurity training platform to level up hacking …☆10Feb 1, 2022Updated 4 years ago
- ptrace misconfiguration Local Privilege Escalation☆13Aug 11, 2023Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- A privilege escalation payload for Flipper Zero☆11Nov 28, 2025Updated 3 months ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- A privilege escalation framework for jailbroken iOS projects. Execute blocks as root or any other user.☆11Oct 22, 2019Updated 6 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago