shjeon90 / CRNN-malware-detector
Convolutional Recurrent Neural Net based malware detection model
☆9Updated 4 years ago
Alternatives and similar repositories for CRNN-malware-detector:
Users that are interested in CRNN-malware-detector are comparing it to the libraries listed below
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆19Updated 7 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 6 years ago
- ☆15Updated 6 years ago
- vm -- code interpreter☆26Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- using capstone to assist in increasing the size of C++ objects☆15Updated 5 years ago
- x64dbg Malware Plugin. Detect malicious materials☆15Updated 4 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Evaluating function diffing existing techniques☆12Updated 6 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 7 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- A tool that allows you to assemble and emulate assembly in multiple archs for learning purposes☆13Updated 6 years ago
- Simple x64dbg plugin to show registers on every step.☆16Updated 5 years ago
- A python library for generate ida pro files (*.idb/*.i64) in batch mode & compare executable files use bindiff in batch mode.☆21Updated 6 months ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- convert binary to VEX IR using the C interface provided by pyvex.☆16Updated 2 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- ☆13Updated 6 years ago
- The toolchain of Chosen-instruction attack☆18Updated 2 years ago