AVClass malware labeling tool
☆485Oct 22, 2024Updated last year
Alternatives and similar repositories for avclass
Users that are interested in avclass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆52Jul 4, 2019Updated 6 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,137Nov 22, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆692Apr 7, 2021Updated 4 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Mar 10, 2023Updated 3 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,112Mar 11, 2026Updated last week
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Jun 17, 2017Updated 8 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- ☆24Apr 17, 2020Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆619Aug 8, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆245Nov 27, 2025Updated 3 months ago
- Defund the Police.☆13,523Jun 7, 2024Updated last year
- The Kam1n0 Assembly Analysis Platform☆626Mar 2, 2023Updated 3 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago