This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset and will be able to see the use of machine learning models using the dataset. We will use machine learning for detect malware.
☆14May 11, 2022Updated 4 years ago
Alternatives and similar repositories for Malware-Detection-Using-Machine-Learning
Users that are interested in Malware-Detection-Using-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Egypt unmanned arial vehicle challange☆15Nov 25, 2021Updated 4 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 6 years ago
- This is a Malware Detection ML model made using Random Forest Algorithm☆40Oct 20, 2024Updated last year
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Jun 15, 2025Updated 11 months ago
- Use Ros, Wecar lane Detection and Yolo Object Detection(Bus Stop) with my friends☆11Oct 24, 2020Updated 5 years ago
- Effective Approaches for Time Series Anomaly Detection☆11Jun 6, 2020Updated 5 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Wifi based Indoor Localization system utilizing Wi-Fi Fingerprinting Technique - AI/ML Approach☆23Sep 26, 2023Updated 2 years ago
- In this repository, I have used ARIMA,SARIMA,AutoArima,ANN,CNN and LSTMs for time series modelling and Anomaly detection has been done us…☆12Feb 8, 2021Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆73Oct 10, 2016Updated 9 years ago
- This repository provides code source used in the paper: A Mean Field Theory of Quantized Deep Networks: The Quantization-Depth Trade-Off☆13May 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A neural approach to malware detection in portable executables☆82Mar 20, 2023Updated 3 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆19Apr 30, 2020Updated 6 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- Fast PyQt5 Youtube download application☆11Dec 27, 2024Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- High-Performance Face Recognition Framework (models trained on MS1MV2) | In PyTorch >> ONNX Runtime Inference☆21Feb 13, 2026Updated 3 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Building the perception stage of a small autonomous racecar system running on NVIDIA Jetson TX2. ZED Stereo Camera is used for visual inp…☆13Mar 24, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- VIA Autonomous. Self-driving car on ROS 2.0. Currently supporting lane following and traffic sign detection.☆13Sep 17, 2021Updated 4 years ago
- ☆14Jan 16, 2022Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆10Aug 17, 2023Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- This algorithm is integrated with anvil website which identifies the alphabet present in the given input image.☆12Jul 9, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Self-driving RC Car ROS Software☆19Mar 19, 2018Updated 8 years ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆21Apr 30, 2026Updated 3 weeks ago
- Generate IDN homographs and phishing domains☆12Aug 21, 2023Updated 2 years ago
- Advanced Lane Detection Project which includes advanced image processing to detect lanes irrespective of the road texture, brightness, co…☆14Dec 6, 2018Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- End-to-end autonomous vehicle capable of sensing, perception, planning & control.☆17Mar 25, 2023Updated 3 years ago