naritapandhe / Microsoft-Malware-Classification-ChallengeLinks
This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.
☆11Updated 9 years ago
Alternatives and similar repositories for Microsoft-Malware-Classification-Challenge
Users that are interested in Microsoft-Malware-Classification-Challenge are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of MalConv☆72Updated 4 years ago
- Detect x86 shellcode in files and traffic.☆25Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- ☆50Updated 9 years ago
- ☆80Updated 6 years ago
- ☆16Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Updated 3 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Updated 5 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- ☆43Updated 7 years ago
- similarity digest hashing tool☆177Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- A framework for streamlining the capture of PANDA execution traces.☆57Updated 5 years ago
- RNN implementation with Keras for machine activity data to predict malware☆43Updated 2 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 7 years ago
- ☆93Updated 7 years ago
- ☆20Updated last year
- Automated Yara Rule generation using Biclustering☆77Updated 4 months ago
- Malware Detection and Classification Using Machine Learning☆343Updated 8 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133Updated 10 years ago
- ☆13Updated 7 months ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- BASS - BASS Automated Signature Synthesizer☆179Updated 7 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 7 years ago
- Malice AntiVirus Plugins☆118Updated 7 years ago