Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.
☆22Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for brazilian-malware-dataset
Users that are interested in brazilian-malware-dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Jul 14, 2019Updated 6 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆26Jul 25, 2023Updated 2 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆259Nov 22, 2021Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆94Mar 31, 2024Updated 2 years ago
- ☆26Nov 22, 2021Updated 4 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆13Jun 15, 2025Updated 10 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆247Nov 27, 2025Updated 5 months ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Aug 23, 2018Updated 7 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆11Mar 3, 2019Updated 7 years ago
- LGEB: Benchmark of Language Generation Evaluation☆16Oct 21, 2022Updated 3 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,152Nov 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- ☆15Mar 19, 2022Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Import all your chromepasswords to iCloud☆10Mar 25, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- idax: IDASDK extension libraries☆24Oct 12, 2025Updated 6 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- ☆12Feb 18, 2021Updated 5 years ago