li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-ScriptsView on GitHub
☆22Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts
Users that are interested in Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- Powershell script deobfuscation using AST in Python☆74Sep 20, 2025Updated 6 months ago
- ☆16Aug 22, 2019Updated 6 years ago
- Discovered Data and Source Code☆10May 5, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- malicious PowerShell script detection model☆43Aug 30, 2021Updated 4 years ago
- ☆14Jun 17, 2020Updated 5 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆60Nov 5, 2025Updated 5 months ago
- Thesis for my masters in Computer Science☆11Jul 10, 2017Updated 8 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) re…☆16Jan 29, 2025Updated last year
- ☆14May 30, 2022Updated 3 years ago
- ☆14Feb 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Mar 2, 2018Updated 8 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Graph-based incremental static analysis of ECMAScript 6 source code repositories☆20Feb 18, 2018Updated 8 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆20Sep 11, 2025Updated 7 months ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- [AST'26] LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing☆24Dec 3, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Jul 1, 2024Updated last year
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- ☆86Feb 24, 2025Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Generic and transparent TLS inspection for local programs☆26Oct 24, 2024Updated last year
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- ☆16Sep 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆64Apr 1, 2021Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Rootkit。 进程监控。☆11Jul 19, 2016Updated 9 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year