PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
☆28Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for PackGenome-Artifacts
Users that are interested in PackGenome-Artifacts are comparing it to the libraries listed below
Sorting:
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- ☆15Feb 29, 2024Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- 分析指定应用程序的劫持DLL☆14Sep 18, 2015Updated 10 years ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Oct 6, 2023Updated 2 years ago
- ☆18Mar 15, 2024Updated last year
- 17条检测cobaltstrike的suricata-ids规则☆69Jun 20, 2022Updated 3 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- www.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.☆20Feb 29, 2016Updated 10 years ago
- YARA Language Server☆74Feb 3, 2026Updated last month
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- JA4X for Go☆46Sep 29, 2023Updated 2 years ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- ☆59Oct 17, 2024Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆30Mar 15, 2024Updated last year
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆33Mar 12, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- 基于深度学习的恶意软件检测研究;MalConv;☆118Jun 22, 2022Updated 3 years ago
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 10 months ago
- 一个基于分布式爬虫的信安文章搜索引擎☆27May 22, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- 中国传媒大学网络安全本科专业课程课件☆29Feb 22, 2025Updated last year
- ☆22Jun 20, 2024Updated last year