rakshithShetty / A4NT-author-maskingLinks
Repository for author masking
☆12Updated 7 years ago
Alternatives and similar repositories for A4NT-author-masking
Users that are interested in A4NT-author-masking are comparing it to the libraries listed below
Sorting:
- PDF Malware Parser☆20Updated 9 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 7 years ago
- A set of templates for different academic venues.☆29Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- ☆79Updated 5 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- ☆12Updated 4 years ago
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- Text steganography based on Markov chains☆34Updated 11 years ago
- QEmu backend for avatar²☆21Updated 7 months ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Game-Theoretic Adversarial Machine Learning Library☆59Updated 7 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆53Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆15Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- AST - Extractor for LLVM☆18Updated 4 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Code for cracking passwords with neural networks☆238Updated 5 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 7 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- ☆55Updated 6 years ago