CNN for detecting malicious PDF
☆11Jul 25, 2024Updated last year
Alternatives and similar repositories for DeePDF
Users that are interested in DeePDF are comparing it to the libraries listed below
Sorting:
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- ☆17May 15, 2023Updated 2 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Dec 3, 2022Updated 3 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- 🔥🔥超过1000本的计算机经典书籍,涵盖:计算机系统与网络、系统架构、算法与数据结构、前端开发、后端开发、移动开发、数据库、测试、项目与团队、程序员职业修炼、求职面试等,持续更新,欢迎star☆11May 6, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- This software is an API in C++ to decode and encode ASTERIX data☆11Mar 8, 2018Updated 7 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- GNU Readline based Python REPL without any external dependencies☆11Jun 12, 2023Updated 2 years ago
- Manager for remote ~/.ssh/authorized_keys☆13Mar 20, 2013Updated 12 years ago
- A small java based program to delete EXIF metadata from images.☆12May 4, 2023Updated 2 years ago
- SSH Over websockets☆12Jul 12, 2018Updated 7 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Implementing a simple pub/sub design pattern in Go☆10Jan 9, 2023Updated 3 years ago
- 📜 Full-time course that will take you from zero to a productive Haskell and Smart Contract developer. Course info, plan, video lectures,…☆11Mar 27, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- self contained mfkey tool for all 3 mfkeys☆18Sep 20, 2024Updated last year
- This repository includes some r2frida scripts to monitor iOS and Android Mobile apps.☆11Dec 21, 2021Updated 4 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Eurocontrol Asterix decoder framework based on XML declarations☆10Jan 26, 2023Updated 3 years ago
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- Obfuscate any Python with only built-in functions☆14Oct 11, 2025Updated 4 months ago
- MATLAB code for semi-supervised learning based on positive-unlabeled learning☆11Mar 21, 2018Updated 7 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago