shreyansh26 / ELF-MinerView external linksLinks
An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables"
☆15Dec 21, 2018Updated 7 years ago
Alternatives and similar repositories for ELF-Miner
Users that are interested in ELF-Miner are comparing it to the libraries listed below
Sorting:
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆14Feb 18, 2021Updated 4 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 weeks ago
- 基于机器学习的 Webshell 检测 (OPCode -> N-Gram -> TF-IDF -> XGBoost)☆47Jun 13, 2021Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- ☆39Dec 31, 2025Updated last month
- Automated Yara Rule generation using Biclustering☆77Oct 8, 2025Updated 4 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- Python implementation of the LZJD algorithm☆32Jul 10, 2025Updated 7 months ago
- Google Safe Browsing API v4 Client Implementation in Java☆10Jul 7, 2022Updated 3 years ago
- ☆37Sep 15, 2022Updated 3 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆10Sep 24, 2019Updated 6 years ago
- ☆41Feb 26, 2023Updated 2 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Dec 1, 2024Updated last year
- 北京 青年大学习 使用Github Actions自动完成☆10Nov 5, 2022Updated 3 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- Dataset of packed PE samples☆43Jan 24, 2026Updated 3 weeks ago
- ☆16Jul 8, 2024Updated last year
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 10 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Material for a training on AI tools☆18Feb 3, 2026Updated last week
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Malware Classification and Labelling using Deep Neural Networks☆41Feb 1, 2020Updated 6 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Source code of 2023 ITHome Ironman Challenge☆14Oct 1, 2023Updated 2 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆12Nov 14, 2023Updated 2 years ago
- Repository for the training on using GPUs from Python.☆16Dec 16, 2025Updated last month
- ☆43Jun 14, 2022Updated 3 years ago
- MCP server for Ethereum research: EIP-1559, Blobs, and MEV analytics powered by Dune☆23Nov 27, 2025Updated 2 months ago