reillydj / KaggleMicrosoftMalware
Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.
☆11Updated 9 years ago
Related projects: ⓘ
- Kaggle "Microsoft Malware Classification Challenge". 6th place solution☆27Updated 9 years ago
- ☆12Updated 7 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- A weekly challenge where we share some code and you find a bug in it.☆69Updated 8 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 7 years ago
- ☆93Updated 5 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆9Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆42Updated 7 years ago
- Using RNNs for password cracking☆85Updated 3 years ago
- Malware Classification using Graph Clustering☆14Updated 11 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- Identifies phishing websites using a treebag model☆22Updated 3 years ago
- ☆32Updated 6 years ago
- ☆33Updated 7 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 7 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 6 years ago
- Compilation of peHash implementations.☆13Updated 5 years ago
- A Content Anomaly Detector based on n-Grams☆22Updated 8 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 5 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆107Updated 2 years ago
- ☆45Updated 7 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 9 years ago
- ☆18Updated this week
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- A Network Inspection Tool☆79Updated 6 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- ☆12Updated this week
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆78Updated 10 years ago
- ☆32Updated this week