Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features publication
☆26Nov 3, 2015Updated 10 years ago
Alternatives and similar repositories for Malware-Detection-Using-Two-Dimensional-Binary-Program-Features
Users that are interested in Malware-Detection-Using-Two-Dimensional-Binary-Program-Features are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 7 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆73Oct 10, 2016Updated 9 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆74Nov 10, 2019Updated 6 years ago
- Detecting Malware in PE files☆28Aug 8, 2023Updated 2 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- This repository contains the winning solution (2nd place) of the Macrosoft Maleware Prediction Challenge on Kaggle.☆31Mar 25, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 7 months ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26May 9, 2026Updated last week
- ☆13Jun 15, 2025Updated 11 months ago
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆90Jun 17, 2024Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆50Mar 10, 2016Updated 10 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 7 years ago
- A fuzz job for ClamAV☆32Jun 13, 2016Updated 9 years ago
- 基于恶意样本的图像化,对恶意代码进行机器学习并进行检测☆11Mar 25, 2018Updated 8 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- 恶意软件检测系统后端代码☆12Nov 28, 2020Updated 5 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Wifi based Indoor Localization system utilizing Wi-Fi Fingerprinting Technique - AI/ML Approach☆23Sep 26, 2023Updated 2 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆29Apr 23, 2021Updated 5 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 8 years ago
- ☆28Nov 23, 2023Updated 2 years ago
- Python implementation of zzuf mutator - little bit-flip atomic bomb☆71Nov 15, 2016Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago