joyce8 / MalDICT
Malware datasets tagged by behavior, platform, vulnerability, and packer
☆22Updated last year
Alternatives and similar repositories for MalDICT:
Users that are interested in MalDICT are comparing it to the libraries listed below
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- ☆27Updated last month
- Malware Bypass Research using Reinforcement Learning☆104Updated 11 months ago
- ☆10Updated 2 years ago
- Transformer Neural Network from Dynamic Malware Detection☆28Updated 8 months ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆218Updated 2 months ago
- ☆35Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆85Updated 9 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆79Updated last year
- ☆21Updated 3 years ago
- ☆77Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆22Updated 3 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆38Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- ☆35Updated 7 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆53Updated 3 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆18Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆50Updated 10 months ago
- Benign .NET files☆32Updated 7 months ago
- Research tool able to detect and mitigate evasion techniques used by malware in-the-wild☆11Updated 2 years ago
- ☆102Updated 4 years ago
- ☆76Updated 2 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Dataset with labeled benign and malicious files 🗃️☆113Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago