mpasco / MalbehavD-V1
Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing on the area of malware detection. It is suitable for training and testing both machine learning and deep learning algorithms.
☆22Updated last year
Alternatives and similar repositories for MalbehavD-V1:
Users that are interested in MalbehavD-V1 are comparing it to the libraries listed below
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆77Updated 11 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆43Updated 4 months ago
- Dataset with labeled benign and malicious files 🗃️☆110Updated last year
- Malware Classification using Machine learning☆72Updated 3 months ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆241Updated 3 years ago
- ☆34Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆24Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆31Updated 4 years ago
- Benign .NET files☆32Updated 6 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆38Updated last year
- ☆11Updated 2 years ago
- A neural approach to malware detection in portable executables☆78Updated last year
- A large-scale database of malicious software images☆47Updated 3 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆18Updated 4 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆110Updated 3 months ago
- Malware Classification and Labelling using Deep Neural Networks☆34Updated 5 years ago
- ☆28Updated 2 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆38Updated last week
- ☆21Updated 3 years ago
- This project is Malware detection API using ML and CNN techniques☆23Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Malware classification using VirusTotal API and Python. Classified malware families are Worms, Adware, Virus, Riskware, Spyware, Keylogge…☆8Updated 3 years ago
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆73Updated last year
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Automatic Malware Signature Generation Tool☆15Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago