This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset and will be able to see the use of machine learning models using the dataset. We will use machine learning for detect malware.
☆13May 11, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Detection-Using-Machine-Learning
Users that are interested in Malware-Detection-Using-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- ☆36Sep 5, 2020Updated 5 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- ☆12Sep 29, 2025Updated 5 months ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- This is a termux sms booming tool☆11Aug 20, 2023Updated 2 years ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc …☆55May 8, 2023Updated 2 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- ptrace misconfiguration Local Privilege Escalation☆13Aug 11, 2023Updated 2 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- A privilege escalation payload for Flipper Zero☆11Nov 28, 2025Updated 3 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆15Apr 15, 2021Updated 4 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Looney Tunables Local privilege escalation (CVE-2023-4911) workshop☆15Oct 1, 2024Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year