packgenome / PackGenome-ArtifactsView external linksLinks
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
☆28Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for PackGenome-Artifacts
Users that are interested in PackGenome-Artifacts are comparing it to the libraries listed below
Sorting:
- ☆16Aug 22, 2019Updated 6 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 weeks ago
- ☆10Dec 30, 2020Updated 5 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- ☆15Feb 29, 2024Updated last year
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- 分析指定应用程序的劫持DLL☆14Sep 18, 2015Updated 10 years ago
- ☆18Mar 15, 2024Updated last year
- YARA Language Server☆75Feb 3, 2026Updated last week
- 17条检测cobaltstrike的suricata-ids规则☆69Jun 20, 2022Updated 3 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- www.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.☆20Feb 29, 2016Updated 9 years ago
- Simple PoC causing overflow☆19Oct 11, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Updated this week
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- JA4X for Go☆46Sep 29, 2023Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Python implementation of the Packed Executable iDentifier (PEiD)☆143May 15, 2024Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- FiFTy: Large-scale File Fragment Type Identification using Neural Networks☆23Mar 13, 2024Updated last year
- ☆39Dec 31, 2025Updated last month
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆33Mar 12, 2023Updated 2 years ago
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆35Mar 9, 2024Updated last year
- ☆28Jan 24, 2024Updated 2 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆119Jun 22, 2022Updated 3 years ago
- ☆35Jan 13, 2026Updated last month
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 9 months ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- 一个基于分布式爬虫的信安文章搜索引擎☆27May 22, 2023Updated 2 years ago