RNN implementation with Keras for machine activity data to predict malware
☆43Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for malware-prediction-rnn
Users that are interested in malware-prediction-rnn are comparing it to the libraries listed below
Sorting:
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆23Feb 20, 2026Updated last week
- ☆25Nov 22, 2021Updated 4 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 6 months ago
- ☆13Jun 15, 2025Updated 8 months ago
- ☆13Jun 19, 2018Updated 7 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Spot malwares using Machine Learning techniques☆52Nov 29, 2019Updated 6 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- ☆36Sep 5, 2020Updated 5 years ago
- MVP for updated PEP 543 proposal☆14Feb 13, 2026Updated 3 weeks ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- ☆12May 30, 2019Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Prioritized Sequence Experience Replay☆10Aug 16, 2021Updated 4 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- 个人博客 https://enfangzhong.github.io/☆10Dec 7, 2022Updated 3 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- UnionType in Idris☆11Jun 24, 2018Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- A collection of Linux Malware Detection projects (research paper implementations) done by me.☆11Jan 6, 2019Updated 7 years ago
- Pythonic library of Rewind.ai SQLite Database. Includes CLI and MCP interfaces.☆18Sep 5, 2025Updated 6 months ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Implementation of second factor authentication with FIDO U2F tokens in a flask application☆11Jan 21, 2023Updated 3 years ago
- ☆10Nov 6, 2018Updated 7 years ago