Additional material for the malware variants identification paper
☆10Sep 6, 2019Updated 6 years ago
Alternatives and similar repositories for Malware.Variants
Users that are interested in Malware.Variants are comparing it to the libraries listed below
Sorting:
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Course Material☆20Feb 9, 2020Updated 6 years ago
- A simple arduino device for noise level detection☆13Dec 16, 2016Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- [DEPRECATED] A vscode extension to format javascript using prettier-eslint☆24Jul 4, 2017Updated 8 years ago
- A branch-monitor-based solution for process monitoring.☆138Feb 9, 2020Updated 6 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- A simple API monitor for Windbg☆65Apr 22, 2017Updated 8 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- 渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc html-poc getshell csrf xss cms php-getshell domainmod-xss…☆13Jan 8, 2020Updated 6 years ago
- awesome hacking chinese version☆24Apr 10, 2017Updated 8 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 6 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ssaview live-renders the SSA representation of a go program☆70Nov 6, 2015Updated 10 years ago
- Dataset of reverse engineering tasks done using LLMs.☆68Apr 14, 2025Updated 11 months ago
- Taint Analysis for PHP☆45Apr 17, 2016Updated 9 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- The code and test data from our CODASPY 2017 paper.☆12May 15, 2025Updated 10 months ago