naritapandhe / Microsoft-Malware-Classification-ChallengeLinks
This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.
☆11Updated 8 years ago
Alternatives and similar repositories for Microsoft-Malware-Classification-Challenge
Users that are interested in Microsoft-Malware-Classification-Challenge are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of MalConv☆71Updated 3 years ago
- ☆14Updated 6 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆80Updated 5 years ago
- ☆79Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- ☆20Updated last year
- similarity digest hashing tool☆174Updated 5 years ago
- RNN implementation with Keras for machine activity data to predict malware☆42Updated last year
- Malware Detection and Classification Using Machine Learning☆341Updated 8 years ago
- ☆50Updated 9 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Detect x86 shellcode in files and traffic.☆25Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 8 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Virtual Machine Introspection (VMI) project☆14Updated 10 years ago
- ☆93Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- BASS - BASS Automated Signature Synthesizer☆179Updated 7 years ago
- ☆44Updated 7 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- statistical similarity of binaries (Esh)☆73Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆148Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆88Updated last year
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- A scalable search index for binary files☆116Updated 7 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133Updated 10 years ago