☆14Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Datacon2019-Malicious-Code-DataSet-Stage2
Users that are interested in Datacon2019-Malicious-Code-DataSet-Stage2 are comparing it to the libraries listed below
Sorting:
- ☆27Jul 14, 2019Updated 6 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 4 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Nov 17, 2020Updated 5 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- 爬取百度指数数据☆12Dec 8, 2022Updated 3 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Nov 22, 2021Updated 4 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆81May 1, 2023Updated 2 years ago
- ☆172Aug 29, 2018Updated 7 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆57Nov 5, 2025Updated 3 months ago