Ransomware Detection using Machine Learning Models and Ensemble Technique
☆35Aug 8, 2024Updated last year
Alternatives and similar repositories for RansomwareDetection
Users that are interested in RansomwareDetection are comparing it to the libraries listed below
Sorting:
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- A simple stateless packet filtering firewall built on top of eBPF/XDP☆10Nov 14, 2022Updated 3 years ago
- Memory check for C/C++.☆12Sep 7, 2017Updated 8 years ago
- ☆10Jun 22, 2021Updated 4 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- an eBPF and XDP program example with libbpf☆14Aug 15, 2023Updated 2 years ago
- ☆13May 16, 2022Updated 3 years ago
- Repo to store research paper regarding multiple topics☆20Jan 16, 2023Updated 3 years ago
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- DeepSearch is a powerful Python-based OSINT utility that leverages Google's advanced search operators to perform comprehensive digital fo…☆56Dec 24, 2025Updated 2 months ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- PHP lightweight in-app Web Application Firewall☆21Aug 6, 2024Updated last year
- ICSs virtualized lab for cybersecurity testing☆26Jun 28, 2023Updated 2 years ago
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆27Jun 7, 2023Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- Systematic exploration of C++ fundamentals based on The Cherno’s C++ series, with a focus on memory, object lifetime, performance, and mo…☆25Dec 19, 2025Updated 2 months ago
- File System Integrity checker (etc)☆33Nov 14, 2017Updated 8 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Feb 12, 2023Updated 3 years ago
- ☆32Jul 25, 2023Updated 2 years ago
- ☆39Oct 16, 2018Updated 7 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- snort3.0 源码分析☆35Aug 8, 2019Updated 6 years ago
- This is a Malware Detection ML model made using Random Forest Algorithm☆39Oct 20, 2024Updated last year
- ☆28Jul 18, 2020Updated 5 years ago
- Install A virus that forwards all sms to you what victim gets☆32Nov 4, 2023Updated 2 years ago
- ☆30Nov 8, 2017Updated 8 years ago
- 针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。☆40Sep 10, 2025Updated 5 months ago
- Eclipse NeoSCADA™☆36Apr 11, 2019Updated 6 years ago
- IBM Cybersecurity Analyst Assessment☆37Sep 1, 2020Updated 5 years ago
- Operational Technology (OT) Simulator☆54Oct 6, 2025Updated 4 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- 《深入理解Semgrep》Finding vulnerabilities with Semgrep.☆58Jul 20, 2023Updated 2 years ago