AVCLASS++: Yet Another Massive Malware Labeling Tool
☆14Dec 7, 2019Updated 6 years ago
Alternatives and similar repositories for avclassplusplus
Users that are interested in avclassplusplus are comparing it to the libraries listed below
Sorting:
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26May 29, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ☆14May 14, 2018Updated 7 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- 基于恶意样本的图像化,对恶意代码进行机器学习并进行检测☆11Mar 25, 2018Updated 7 years ago
- A malware family classification model based on CNN☆25Nov 7, 2022Updated 3 years ago
- Python library for managing VirtualBox remotely using it's SOAP API☆20Feb 3, 2025Updated last year
- 恶意软件检测系统后端代码☆12Nov 28, 2020Updated 5 years ago
- ☆30Nov 8, 2017Updated 8 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- program course for haidian fellowship☆10Apr 15, 2021Updated 4 years ago
- Jittor implementation of Graph Convlution Networks☆17Jun 7, 2021Updated 4 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- Implementation of the dilated self attention as described in "LongNet: Scaling Transformers to 1,000,000,000 Tokens"☆13Jul 23, 2023Updated 2 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- a pytorch implement of Supervised Contrastive Learning with memory bank(queue)☆15May 25, 2022Updated 3 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- 小型主动防御引擎☆57Jun 24, 2016Updated 9 years ago
- [TextING-pytorch] Pytorch implementation for "Every Document Owns Its Structure: Inductive Text Classification via Graph Neural Networks"☆13Feb 10, 2021Updated 5 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Towards Sustainable Learning: Coresets for Data-efficient Deep Learning☆13Jul 5, 2023Updated 2 years ago
- linux kernel for gdk8☆10Jan 30, 2022Updated 4 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Le mode héros de wakfu dans dofus retro☆14May 31, 2023Updated 2 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago