☆29Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for transcendent-release
Users that are interested in transcendent-release are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆18Dec 10, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆94Sep 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续 、错误重试等☆57Oct 19, 2023Updated 2 years ago
- Popular Android malware datasets☆171Oct 10, 2018Updated 7 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆50Jan 10, 2022Updated 4 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- KronoDroid Dataset☆36Nov 7, 2025Updated 4 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Jan 22, 2024Updated 2 years ago
- ☆14Apr 4, 2024Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆34Aug 28, 2024Updated last year
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- Example TrojAI Submission☆27Dec 6, 2024Updated last year
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Feb 18, 2026Updated last month
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🎮 A configurable Breakout environment for reinforcement learning☆11Mar 20, 2018Updated 8 years ago
- ☆31Sep 22, 2024Updated last year
- Implementation of mixed language project compilation via Bazel platform.☆17Oct 10, 2020Updated 5 years ago
- Download APKs from APKMirror.com☆11May 27, 2021Updated 4 years ago
- A collection of security papers on top-tier publications☆60Mar 15, 2026Updated last week
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- Code for the API, workload execution, and agents underlying the LLMail-Inject Adpative Prompt Injection Challenge☆21Mar 1, 2026Updated 3 weeks ago
- ☆13May 13, 2025Updated 10 months ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An extendable and flexible infrastructure for program instrumentation.☆26Feb 19, 2026Updated last month
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- From-Classification-to-Clinical☆12Apr 26, 2024Updated last year
- ☆18Sep 4, 2023Updated 2 years ago
- ☆16Nov 8, 2024Updated last year
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- FHE (CKKS, TFHE) end-to-end applications: HELR (logistic regression), ResNet-20, LSTM (RNN), bitonic sorting, DeepCNN-x☆18Aug 14, 2024Updated last year