shreyansh26 / Opcodes-for-Malware-DetectionLinks
Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar
☆11Updated 4 years ago
Alternatives and similar repositories for Opcodes-for-Malware-Detection
Users that are interested in Opcodes-for-Malware-Detection are comparing it to the libraries listed below
Sorting:
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- Extensible Platform for Malware Analysis☆17Updated 4 years ago
- Network-Based Malware Detection using Natural Language Processing☆14Updated 4 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- Static analysis framework for EVM bytecode☆30Updated 5 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Research papers on ML for security☆34Updated 4 years ago
- ☆40Updated last year
- Protocol Inspection and State Machine Analysis☆24Updated 7 years ago
- A Symbolic Execution Engine for Wasm Bytecode and A Cross-Platform Smart Contract Vulnerability Detector☆30Updated 2 years ago
- Public BanditFuzz Repo☆12Updated 4 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆48Updated 2 months ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- Parse YARA rules and operate over them more easily.☆189Updated 4 months ago
- Ethereum smart contract reverse engineering☆102Updated 6 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- ☆23Updated 4 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆22Updated 2 years ago
- ☆80Updated 2 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- ☆79Updated 5 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 6 years ago
- ☆14Updated 6 years ago
- BinaryCFGExtractor is an automated tool for extracting binary code control flow graph (CFG).☆15Updated 4 years ago