Midterm Project for the AI & Cybersecurity Course - University of New Haven
☆16Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Cloud-based-PE-Malware-Detection-API
Users that are interested in Cloud-based-PE-Malware-Detection-API are comparing it to the libraries listed below
Sorting:
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Apr 2, 2021Updated 4 years ago
- It is a Full-Stack GUI Application using Java Swing API☆13Sep 19, 2024Updated last year
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Like the British said☆12Nov 15, 2023Updated 2 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- Team - Akhilesh, Jahnavi & me developed Graphical Password Authentication System for Signup & Login || Cyber Security Internship ||☆10Sep 5, 2021Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- Deep learning malware detection system using the EMBER dataset☆11Nov 22, 2024Updated last year
- ☆13May 10, 2018Updated 7 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Mar 2, 2021Updated 5 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Malware Detection using Convolutional Neural Networks☆12Mar 24, 2023Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- ☆14Mar 15, 2023Updated 2 years ago
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated 10 months ago
- ☆13May 22, 2021Updated 4 years ago
- ☆13Feb 17, 2024Updated 2 years ago
- ☆14Jul 18, 2023Updated 2 years ago
- 📌🤝Water Quality Monitoring Centralized Dashboard with various water quality parameters using Remote Sensing and AI for better decision …☆15Oct 9, 2025Updated 4 months ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- Questo repository traccia le attività del gruppo operativo per la sperimentazione di un meccanismo di Info Sharing fatto dalla community …☆15Jun 5, 2021Updated 4 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 2 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- HTML and CSS boiler plate for my JS Dashboard Masterclass course☆15Jul 18, 2022Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Project for CyberSecurity Bachelor☆16Mar 9, 2022Updated 3 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Code for PepysDiary.com☆16Jan 15, 2026Updated last month
- Wifi based Indoor Localization system utilizing Wi-Fi Fingerprinting Technique - AI/ML Approach☆22Sep 26, 2023Updated 2 years ago