rjjoyce / MalDICTLinks
Malware datasets tagged by behavior, platform, vulnerability, and packer
☆28Updated last year
Alternatives and similar repositories for MalDICT
Users that are interested in MalDICT are comparing it to the libraries listed below
Sorting:
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆74Updated 2 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆240Updated 3 weeks ago
- Automated Yara Rule generation using Biclustering☆76Updated 2 months ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆88Updated last year
- ☆80Updated 6 years ago
- ☆10Updated 3 years ago
- Dataset with labeled benign and malicious files 🗃️☆147Updated 2 years ago
- Transformer Neural Network from Dynamic Malware Detection☆38Updated 3 weeks ago
- ☆37Updated 6 months ago
- ☆44Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- Benign .NET files☆41Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- ☆38Updated last year
- A neural approach to malware detection in portable executables☆80Updated 2 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆93Updated 7 years ago
- ☆161Updated 3 years ago
- Malware Classification using Machine learning☆74Updated last year
- Security ML models encoded as Yara rules☆214Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- ☆34Updated this week
- ☆127Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- ☆25Updated 4 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆253Updated 4 years ago