joyce8 / MalDICT
Malware datasets tagged by behavior, platform, vulnerability, and packer
☆18Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for MalDICT
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆59Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆207Updated 4 months ago
- ☆22Updated last year
- Malware Bypass Research using Reinforcement Learning☆102Updated 7 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆75Updated 4 years ago
- ☆96Updated 4 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆83Updated 5 months ago
- Dataset with labeled benign and malicious files 🗃️☆100Updated last year
- Automated Yara Rule generation using Biclustering☆60Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆73Updated 7 months ago
- Transformer Neural Network from Dynamic Malware Detection☆26Updated 4 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 6 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆37Updated last year
- Security ML models encoded as Yara rules☆211Updated last year
- ☆143Updated 2 years ago
- ☆30Updated 8 months ago
- ☆19Updated 3 years ago
- Benign .NET files☆31Updated 3 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆14Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Adversarial Malware Generator Using GANs☆52Updated 4 months ago
- ☆20Updated 3 years ago
- ☆33Updated 3 months ago
- ☆10Updated 2 years ago
- ☆73Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆17Updated last year
- Pytorch implementation of MalConv☆70Updated 2 years ago