☆27May 27, 2020Updated 5 years ago
Alternatives and similar repositories for Malware_Classification
Users that are interested in Malware_Classification are comparing it to the libraries listed below
Sorting:
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 3 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- Multi-class malware classification using Deep Learning☆77Oct 3, 2020Updated 5 years ago
- A large-scale database of malicious software images☆51Aug 27, 2021Updated 4 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆76Sep 12, 2025Updated 5 months ago
- ☆10Dec 30, 2020Updated 5 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- ☆11Feb 19, 2022Updated 4 years ago
- ☆36Sep 5, 2020Updated 5 years ago
- CLIPCleaner: Cleaning Noisy Labels with CLIP (ACM MM2024)☆13Apr 28, 2025Updated 10 months ago
- My documented journey to learning fastapi☆11Apr 30, 2023Updated 2 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- SIEM, Visibility, and Event-Driven Architecture Curated Solutions. Build a cost-effective threat detection and log management system.☆18Jan 17, 2024Updated 2 years ago
- Minimal OS written in Jack.☆12Nov 24, 2022Updated 3 years ago
- Secure Federated Learning Framework with Encryption Aggregation and Integer Encoding Method.☆10Jul 1, 2024Updated last year
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- fine-tune an LLM to mimic your writing style☆10Mar 17, 2024Updated last year
- ☆11Dec 17, 2024Updated last year
- List all unique citations in your document☆12Feb 17, 2024Updated 2 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- ☆10Jul 18, 2023Updated 2 years ago
- ☆14Apr 24, 2024Updated last year
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆12Apr 10, 2019Updated 6 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- API todomi - Hexagonal architecture deep understanding☆12Jan 28, 2023Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago