Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.
☆15Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for detector_mw
Users that are interested in detector_mw are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 14, 2019Updated 6 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆22Nov 30, 2020Updated 5 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated 2 years ago
- ☆35Sep 5, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 👾 Malware Classification using Deep Learning and Cuckoo Sandbox☆14Jun 18, 2022Updated 3 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- ☆28Jul 14, 2019Updated 6 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆21Jun 11, 2023Updated 2 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- ☆12Aug 8, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆11Mar 3, 2019Updated 7 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- ☆12Nov 10, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- MurPhySDR is an open source software-defined radio platform based on the AD9364 transceiver IC.☆13Jul 9, 2024Updated last year
- ☆21Sep 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Verilog IP Cores & Tests☆13May 3, 2018Updated 8 years ago
- Documentation for srsRAN Project, an open-source 5G CU/DU solution.☆17Feb 23, 2026Updated 2 months ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- An Xcode template for creating new Raspberry Pi Pico projects☆13Apr 27, 2022Updated 4 years ago
- https://hackaday.io/project/181521-freeeeg128-alpha☆15Sep 6, 2022Updated 3 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 7 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PHP 8 Sandbox Escape☆84Feb 28, 2026Updated 2 months ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago