PDF Malware Parser
☆20Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for PDF-Malware-Parser
Users that are interested in PDF-Malware-Parser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 3 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- ☆14Mar 28, 2018Updated 8 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- ☆11Feb 8, 2026Updated 2 months ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- A crawler for automated Android UI testing.☆19Jun 20, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Seq2act: Mapping Natural Language Instructions to Mobile UI Action Sequences from Google research☆15Jul 13, 2020Updated 5 years ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Meta-learning learning rates with higher☆12Sep 27, 2019Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- ☆10Aug 6, 2022Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Extended code for "Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks" with CIFAR-fs classification☆13Apr 26, 2019Updated 6 years ago
- Distributed sentiment analysis on GitHub commit comments☆10Jun 9, 2015Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Use Python3, Django, Django-rest-framework to achieve alipay payment. 包括支付宝支付,支付宝服务器异步通知,支付宝退款☆12May 26, 2018Updated 7 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dynamic malware analysis for the Android platform☆40Sep 26, 2014Updated 11 years ago
- A general method for training cost-sensitive robust classifier☆22May 29, 2019Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Jun 15, 2019Updated 6 years ago