geeksonsecurity / js-malicious-datasetLinks
This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.
☆92Updated 2 years ago
Alternatives and similar repositories for js-malicious-dataset
Users that are interested in js-malicious-dataset are comparing it to the libraries listed below
Sorting:
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 11 years ago
- Set of tools for interacting with Malshare☆159Updated 5 years ago
- Collection of almost 40.000 javascript malware samples☆736Updated last year
- ☆50Updated 9 years ago
- Free Malware Training Datasets for Machine Learning☆239Updated 4 years ago
- A collection of known Domain Generation Algorithms☆67Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Updated 3 years ago
- AVClass malware labeling tool☆481Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 2 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Automated malware unpacker☆121Updated 9 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 10 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- ☆16Updated 7 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- ☆53Updated 10 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399Updated 9 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 8 years ago
- ☆13Updated 7 years ago
- An Automated Vulnerability Detection System☆59Updated 9 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago