☆18Mar 15, 2024Updated 2 years ago
Alternatives and similar repositories for DecodingMLSecretsOfWindowsMalwareClassification
Users that are interested in DecodingMLSecretsOfWindowsMalwareClassification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- ☆43Aug 6, 2021Updated 4 years ago
- CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision☆74Sep 28, 2024Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆12Aug 20, 2024Updated last year
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Offical Implementation for PalmTree☆149Jan 29, 2024Updated 2 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 3 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- ☆12Feb 4, 2022Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆76Sep 25, 2023Updated 2 years ago
- 实现算法可视化使用java + swing<Play Data Structures in Java>. 《Java语言玩转数据结构》代码。☆13May 9, 2019Updated 7 years ago
- ☆50Mar 10, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆87Sep 1, 2025Updated 8 months ago
- ☆43May 5, 2026Updated 2 weeks ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated 2 years ago
- Drebin - NDSS 2014 Re-implementation☆107Dec 20, 2017Updated 8 years ago
- This version of SDN Switch Emulator is deprecated. Please find the new version in (https://github.com/arunmir/sdn-sim3)☆14Oct 1, 2019Updated 6 years ago
- ☆14May 14, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆31Mar 15, 2024Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆94Mar 31, 2024Updated 2 years ago
- FiFTy: Large-scale File Fragment Type Identification using Neural Networks☆23Mar 13, 2024Updated 2 years ago
- 深入浅出最优化系列博客代码 Code of Optimization in a Nutshell☆18Jan 19, 2022Updated 4 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆40Aug 2, 2022Updated 3 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- Designed a digital communication system using QAM modulation on Octave with Symbol Timing and Carrier Frequency Recovery☆20Aug 22, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lite version of LibRadar☆43Apr 8, 2023Updated 3 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆54Jul 4, 2019Updated 6 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆44Dec 17, 2023Updated 2 years ago
- AgentRE-Bench is an agentic benchmark that evaluates state-of-the-art models on long-horizon reverse engineering tasks, measuring their a…☆58Updated this week
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆79Oct 8, 2025Updated 7 months ago
- ☆28Oct 21, 2020Updated 5 years ago