This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.
☆92Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for js-malicious-dataset
Users that are interested in js-malicious-dataset are comparing it to the libraries listed below
Sorting:
- Collection of almost 40.000 javascript malware samples☆741Jul 23, 2024Updated last year
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Feb 1, 2020Updated 6 years ago
- Modular static malicious JavaScript detection system☆75Jan 18, 2021Updated 5 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- A new idea to build an anti ransomware☆24Oct 4, 2020Updated 5 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- ☆11Feb 8, 2026Updated 3 weeks ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- ☆16Mar 5, 2018Updated 8 years ago
- Read pcap and har files and assemble HTTP requests☆21Oct 8, 2023Updated 2 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- This program detects all present and future ransomware in Windows file shares or local drives for Windows file servers. I created this w…☆19Dec 18, 2023Updated 2 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Malwares are here☆25Jan 16, 2025Updated last year
- ☆18Nov 25, 2018Updated 7 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- A readline C and C++ REPL with history, tab-completion, and undo.☆30Nov 26, 2025Updated 3 months ago
- Example Manticore scripts☆68Dec 7, 2023Updated 2 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Aug 18, 2014Updated 11 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Buy Book Online Project uses MVC2 Design Pattern☆17Oct 8, 2022Updated 3 years ago
- Static JavaScript Analysis: AST, Control Flow, Data Flow, & Pointer Analysis☆28Feb 26, 2022Updated 4 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago