mpasco / MalbehavD-V1Links
Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing on the area of malware detection.  It is suitable for training and testing both machine learning and deep learning algorithms. 
☆24Updated 2 years ago
Alternatives and similar repositories for MalbehavD-V1
Users that are interested in MalbehavD-V1 are comparing it to the libraries listed below
Sorting:
- ☆40Updated last year
 - Malware Classification using Machine learning☆74Updated 11 months ago
 - A curated dataset of malware and benign Windows executable samples for malware researchers☆50Updated last year
 - Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆86Updated last year
 - Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆249Updated 3 years ago
 - 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆30Updated last year
 - Dataset with labeled benign and malicious files 🗃️☆139Updated 2 years ago
 - Benign .NET files☆38Updated last year
 - RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated last year
 - A neural approach to malware detection in portable executables☆79Updated 2 years ago
 - Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
 - Automatic Malware Signature Generation Tool☆16Updated 4 years ago
 - This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆47Updated 3 years ago
 - AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
 - Dataset of packed PE samples☆39Updated last year
 - An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 4 years ago
 - Effects of packers on machine-learning-based malware classifiers that use only static analysis☆87Updated last year
 - Code for Benchmarking two ML Approaches performing Authorship Attribution☆40Updated 3 years ago
 - Automated Yara Rule generation using Biclustering☆74Updated 3 weeks ago
 - Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
 - A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆77Updated last month
 - SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 7 months ago
 - Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
 - Powershell script deobfuscation using AST in Python☆72Updated last month
 - Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
 - ☆34Updated 5 years ago
 - A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆73Updated 3 years ago
 - Python scripts for Malware Bazaar☆155Updated last year
 - Collection of rules created using YARA-Signator over Malpedia☆140Updated 11 months ago
 - capemon: CAPE's monitor☆132Updated this week