☆632Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for gym-malware
Users that are interested in gym-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Bypass Research using Reinforcement Learning☆108Apr 22, 2024Updated 2 years ago
- ☆93Dec 14, 2018Updated 7 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆247Nov 27, 2025Updated 5 months ago
- Elastic Malware Benchmark for Empowering Researchers☆1,152Nov 22, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆174Oct 1, 2020Updated 5 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆52Apr 15, 2025Updated last year
- ☆81Dec 6, 2019Updated 6 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆129Jul 20, 2018Updated 7 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Adversarial Malware Generator Using GANs☆55Jul 25, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- pefile is a Python module to read and work with PE (Portable Executable) files☆2,036Updated this week
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 6 months ago
- Sophos-ReversingLabs 20 million sample dataset☆699Apr 7, 2021Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- AVClass malware labeling tool☆486Oct 22, 2024Updated last year
- Free Malware Training Datasets for Machine Learning☆242Jan 3, 2021Updated 5 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Metasploit for machine learning.☆571Mar 25, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- Source code about machine learning and security.☆2,080Sep 2, 2022Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆36Mar 31, 2025Updated last year
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Windows API tracer for malware (oldname: unitracer)☆119Oct 16, 2017Updated 8 years ago
- Machine Learning for Cyber Security☆8,556Aug 19, 2024Updated last year
- ☆75Jan 24, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- ☆1,093May 1, 2019Updated 7 years ago
- A static analyzer for PE executables.☆1,123Mar 11, 2026Updated last month
- ☆28Feb 13, 2017Updated 9 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,683Feb 14, 2024Updated 2 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago