A library for adversarial classifier evasion
☆43Dec 4, 2014Updated 11 years ago
Alternatives and similar repositories for mimicus
Users that are interested in mimicus are comparing it to the libraries listed below
Sorting:
- ☆13Aug 31, 2024Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆111Jul 25, 2024Updated last year
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 4 months ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- Code related to "Learning Continuous Semantic Representations of Symbolic Expressions" project.☆35Dec 8, 2016Updated 9 years ago
- ☆16Mar 5, 2018Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Software vulnerabilities data set☆25Mar 4, 2020Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- eXpandable Open Research on Cyber Information Security Management☆23May 10, 2020Updated 5 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Code for the paper "On the Minimal Supervision for Training Any Binary Classifier from Only Unlabeled Data".☆28May 7, 2019Updated 6 years ago
- ☆22Feb 14, 2017Updated 9 years ago
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- IDA plugin for software complexity metrics assessment☆60Jan 4, 2018Updated 8 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆33Jun 30, 2018Updated 7 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago