Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features publication
☆26Nov 3, 2015Updated 10 years ago
Alternatives and similar repositories for Malware-Detection-Using-Two-Dimensional-Binary-Program-Features
Users that are interested in Malware-Detection-Using-Two-Dimensional-Binary-Program-Features are comparing it to the libraries listed below
Sorting:
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Python implementation of zzuf mutator - little bit-flip atomic bomb☆71Nov 15, 2016Updated 9 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 9 months ago
- ☆50Mar 10, 2016Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- ☆28Nov 23, 2023Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository☆107Dec 17, 2016Updated 9 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Multi-class malware classification using Deep Learning☆77Oct 3, 2020Updated 5 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- ☆10Sep 28, 2020Updated 5 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆19Oct 16, 2024Updated last year
- A tutorial to help you make the move to GitHub☆10Jun 2, 2023Updated 2 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- Decrement Windows Kernel for fun and profit☆39Jan 29, 2018Updated 8 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- 台灣水庫即時水情與歷年統計☆15Updated this week
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- 恶意软件检测系统后端代码☆12Nov 28, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Oct 10, 2016Updated 9 years ago