s2labres / tesseract-ml-releaseView external linksLinks
Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'
☆17Dec 10, 2024Updated last year
Alternatives and similar repositories for tesseract-ml-release
Users that are interested in tesseract-ml-release are comparing it to the libraries listed below
Sorting:
- ☆27Jan 17, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆16Mar 14, 2025Updated 11 months ago
- ☆24Apr 17, 2020Updated 5 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- Malware classification by using assembly files based on machine learning☆14Feb 6, 2025Updated last year
- Epidemiology modelling framework for the Thanzi la Onse project☆33Feb 7, 2026Updated last week
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- 台灣水庫即時水情與歷年統計☆15Dec 31, 2025Updated last month
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- The CTF questions about smart contracts☆11Sep 1, 2018Updated 7 years ago
- Noise supression using deep filtering☆13May 31, 2022Updated 3 years ago
- ☆12Feb 20, 2021Updated 4 years ago
- Templates for commonly used GitHub actions steps☆13Dec 13, 2024Updated last year
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 6 months ago
- Time Domain Maxwell Solver☆13Jan 1, 2026Updated last month
- Computing essentials for HEP analysts☆11Oct 22, 2019Updated 6 years ago
- NIU website on common software problems and their troubleshooting☆10Nov 25, 2025Updated 2 months ago
- ☆11Aug 14, 2025Updated 6 months ago
- 🎮 A configurable Breakout environment for reinforcement learning☆11Mar 20, 2018Updated 7 years ago
- ☆11Jul 8, 2024Updated last year
- Statically compiled binaries for various architectures.☆18Oct 12, 2022Updated 3 years ago
- Code for the API, workload execution, and agents underlying the LLMail-Inject Adpative Prompt Injection Challenge☆19Oct 21, 2025Updated 3 months ago
- ☆14Apr 4, 2024Updated last year
- REST-style API server for the Kuzu graph database powered by Express.js.☆18Oct 10, 2025Updated 4 months ago
- Recent works have demonstrated that deep learning algorithms were very efficient to conduct security evaluations of embedded systems and …☆14Mar 13, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/jbirch☆12Sep 6, 2022Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Jan 10, 2022Updated 4 years ago
- LHCb data analysis lessons☆12Oct 2, 2017Updated 8 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- A tool for estimating a system's information leakage via Machine Learning☆10Jun 28, 2024Updated last year
- Python wrapper for RooFit to create fits easily with pandas DataFrames☆14Dec 21, 2022Updated 3 years ago
- ☆15Feb 5, 2026Updated last week
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- Write-ups for CTF challenges.☆15May 30, 2021Updated 4 years ago
- Bamboofox blog☆11Oct 19, 2022Updated 3 years ago
- ☆11Feb 19, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago