safreita1 / malnet-imageView external linksLinks
A large-scale database of malicious software images
☆51Aug 27, 2021Updated 4 years ago
Alternatives and similar repositories for malnet-image
Users that are interested in malnet-image are comparing it to the libraries listed below
Sorting:
- Malware Classification using Machine learning☆76Nov 9, 2024Updated last year
- A large-scale database for graph representation learning☆55Oct 6, 2022Updated 3 years ago
- Transfer Learning for Image-Based Malware Classification☆46Mar 1, 2022Updated 3 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆27May 27, 2020Updated 5 years ago
- rshell manager for the game Grey Hack☆12May 15, 2024Updated last year
- pentester payload ,info hunte☆10Apr 4, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Dec 1, 2024Updated last year
- 基于深度学习的恶意软件检测研究;MalConv;☆119Jun 22, 2022Updated 3 years ago
- ☆22Jan 21, 2021Updated 5 years ago
- Timing Sidechannel workshop☆30Nov 25, 2013Updated 12 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆21Jan 24, 2022Updated 4 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆95Nov 1, 2018Updated 7 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆28Mar 8, 2022Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆10Apr 13, 2023Updated 2 years ago
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 2 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- ☆37Nov 1, 2024Updated last year
- Source code release for the KRace project☆31Nov 15, 2021Updated 4 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 5 months ago
- HDLBits-Solutions☆10May 27, 2022Updated 3 years ago
- Unnoficial solutions (still under construction) to Nielsen and Chuang's "Quantum Computation and Quantum Information" - 10th anniversary …☆19Updated this week
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆38Aug 8, 2024Updated last year
- A neural approach to malware detection in portable executables☆79Mar 20, 2023Updated 2 years ago
- ☆11Updated this week
- 《智能投顾》读书笔记☆12May 23, 2019Updated 6 years ago
- ADB Usage Complete / ADB 用法大全☆12Jan 17, 2022Updated 4 years ago