PDF Malware Parser
☆20Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for PDF-Malware-Parser
Users that are interested in PDF-Malware-Parser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 31, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 4 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- ☆11Feb 8, 2026Updated 2 months ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆45Jun 16, 2017Updated 8 years ago
- A crawler for automated Android UI testing.☆19Jun 20, 2017Updated 8 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Seq2act: Mapping Natural Language Instructions to Mobile UI Action Sequences from Google research☆15Jul 13, 2020Updated 5 years ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- ☆10Aug 6, 2022Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Tensorflow Implementation of Densely Connected Bidirectional LSTM with Applications to Sentence Classification☆47Apr 1, 2018Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A general method for training cost-sensitive robust classifier☆22May 29, 2019Updated 6 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Jun 15, 2019Updated 6 years ago
- 抓取国家统计局数据☆13May 4, 2016Updated 10 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago