li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-ScriptsView on GitHub
☆22Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts
Users that are interested in Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts are comparing it to the libraries listed below
Sorting:
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆74Sep 20, 2025Updated 6 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- malicious PowerShell script detection model☆43Aug 30, 2021Updated 4 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Practical Tamper-Proof System Auditing☆15Oct 19, 2023Updated 2 years ago
- This repository contains information related to the Root Cause Mapping Working Group and its activities. CVE Numbering Authority (CNA) re…☆16Jan 29, 2025Updated last year
- ☆14May 30, 2022Updated 3 years ago
- ☆20Feb 26, 2024Updated 2 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- ☆16Sep 5, 2024Updated last year
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Rootkit。 进程监控。☆11Jul 19, 2016Updated 9 years ago
- Linux 内核揭密☆10Jan 26, 2018Updated 8 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- The Geospatial Analysis Integrity Tool (GAIT) validates data against a data model. GAIT checks geometry, feature codes, attribute values …☆13Apr 23, 2018Updated 7 years ago
- openthos based on android-x86☆10Mar 27, 2020Updated 5 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Feb 23, 2023Updated 3 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- Sign a paper digitally using QR codes and GPG☆23Jul 15, 2012Updated 13 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- 一个基于 GO 的小型 DNS 解析服务器☆11Oct 22, 2018Updated 7 years ago
- ☆37May 5, 2021Updated 4 years ago
- 序列模式挖掘相关研究☆32Mar 2, 2026Updated 2 weeks ago
- ☆27Aug 10, 2023Updated 2 years ago