li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-ScriptsView external linksLinks
☆22Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts
Users that are interested in Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts are comparing it to the libraries listed below
Sorting:
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 4 years ago
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆56Nov 5, 2025Updated 3 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- malicious PowerShell script detection model☆41Aug 30, 2021Updated 4 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆10Nov 5, 2018Updated 7 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 10 months ago
- ☆13Jan 12, 2018Updated 8 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- OXA - Open XDR architecture☆12Apr 1, 2025Updated 10 months ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 3 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- FEM micromagnetic simulator☆11Feb 6, 2026Updated last week
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- ☆16Jul 1, 2024Updated last year
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- ☆13Sep 14, 2014Updated 11 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago