Midterm Project for the AI & Cybersecurity Course - University of New Haven
☆16Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Cloud-based-PE-Malware-Detection-API
Users that are interested in Cloud-based-PE-Malware-Detection-API are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 2 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Apr 2, 2021Updated 4 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Oct 10, 2016Updated 9 years ago
- This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset an…☆13May 11, 2022Updated 3 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆23Nov 9, 2018Updated 7 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated 2 years ago
- Indoor Positioning System based on RSSI fingerprint positioning using WLAN signals and effective machine learning methods☆24Jun 27, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Multi-class malware classification using Deep Learning☆76Oct 3, 2020Updated 5 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 7 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- This is an extention for Equalizer APO. This will provide a better UI for Edit the configurations.☆16Jun 16, 2023Updated 2 years ago
- ClamAV Antivirus, in a container. Great for Kubelets!☆14Oct 29, 2020Updated 5 years ago
- Collection of Snort 2/3 rules.☆40Jun 22, 2018Updated 7 years ago
- Simple port scanner built using Scapy, performs SYN, UDP and Xmas scans.☆12Mar 28, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆50Mar 10, 2016Updated 10 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆19Aug 19, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- My undergraduate thesis☆22Apr 6, 2021Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- The Absolute Beginners Guide to Cyber Security 2025 - Part 1, by Packt Publishing☆21Mar 19, 2025Updated last year
- ☆18Jun 18, 2021Updated 4 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pentesting Fundamentals for Beginners, published by Packt☆28Jan 30, 2023Updated 3 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Like the British said☆12Nov 15, 2023Updated 2 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago