s2labres / transcendent-releaseView external linksLinks
☆27Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for transcendent-release
Users that are interested in transcendent-release are comparing it to the libraries listed below
Sorting:
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆17Dec 10, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆55Oct 19, 2023Updated 2 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated last year
- Explainable Interactive Concept Learning☆15Mar 26, 2023Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Nov 21, 2025Updated 2 months ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆16Sep 11, 2025Updated 5 months ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 6 months ago
- Rust course☆10May 24, 2025Updated 8 months ago
- Self Tuned Openwrt for NanoPi R2S☆11May 11, 2025Updated 9 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆42Aug 6, 2021Updated 4 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Jan 28, 2026Updated 2 weeks ago
- ☆12Apr 26, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- 🎮 A configurable Breakout environment for reinforcement learning☆11Mar 20, 2018Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 3 months ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- ☆13Jul 26, 2025Updated 6 months ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago