Malware Data Science Reading Diary / Notes
☆129May 5, 2019Updated 6 years ago
Alternatives and similar repositories for MalwareDataScience
Users that are interested in MalwareDataScience are comparing it to the libraries listed below
Sorting:
- small python server to store sensor weather data☆11Jan 23, 2019Updated 7 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- V1.0☆15Aug 8, 2016Updated 9 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,130Nov 22, 2024Updated last year
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- Analysis pipeline for quick ML analyses.☆11Oct 4, 2018Updated 7 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- ☆11Nov 20, 2019Updated 6 years ago
- Source code for golang hacking course on Udemy☆11Mar 22, 2020Updated 5 years ago
- ☆11Feb 8, 2026Updated 3 weeks ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆52Feb 17, 2026Updated 2 weeks ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 5 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆21Updated this week
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆106Jun 1, 2020Updated 5 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- ☆299Mar 8, 2024Updated last year
- yarGen is a generator for YARA rules☆1,776Jan 10, 2026Updated last month
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Mar 24, 2023Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Runtime tracer for the vb6 virtual machine☆54Jan 24, 2018Updated 8 years ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- ☆53Apr 22, 2015Updated 10 years ago
- ☆57Jan 15, 2024Updated 2 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Malware Sample Sources☆608Feb 6, 2021Updated 5 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated last year