mpasco / MalbehavD-V1Links
Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing on the area of malware detection. It is suitable for training and testing both machine learning and deep learning algorithms.
☆23Updated last year
Alternatives and similar repositories for MalbehavD-V1
Users that are interested in MalbehavD-V1 are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆46Updated 9 months ago
- Malware Classification using Machine learning☆73Updated 8 months ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆28Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆83Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆243Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 3 years ago
- Dataset of packed PE samples☆35Updated last year
- Automated Yara Rule generation using Biclustering☆68Updated 4 years ago
- Dataset with labeled benign and malicious files 🗃️☆129Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- capemon: CAPE's monitor☆124Updated 3 weeks ago
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆73Updated 2 years ago
- A neural approach to malware detection in portable executables☆78Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- A large-scale database of malicious software images☆47Updated 3 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Collection of rules created using YARA-Signator over Malpedia☆131Updated 8 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- Malware Classification and Labelling using Deep Neural Networks☆37Updated 5 years ago
- Python scripts for Malware Bazaar☆154Updated last year
- Powershell script deobfuscation using AST in Python☆68Updated last year
- Maco - Malware config extractor framework☆36Updated 4 months ago
- Community modules for CAPE Sandbox☆101Updated 2 weeks ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- Benign .NET files☆34Updated 10 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 5 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 4 months ago
- Framework for Adversarial Malware Evaluation.☆34Updated 3 months ago