A library for adversarial classifier evasion
☆43Dec 4, 2014Updated 11 years ago
Alternatives and similar repositories for mimicus
Users that are interested in mimicus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 31, 2024Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Aug 8, 2019Updated 6 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Code related to "Learning Continuous Semantic Representations of Symbolic Expressions" project.☆35Dec 8, 2016Updated 9 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Mar 5, 2018Updated 8 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆53Jul 4, 2019Updated 6 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- Adversarial Malware Generator Using GANs☆55Jul 25, 2024Updated last year
- Malware Bypass Research using Reinforcement Learning☆108Apr 22, 2024Updated 2 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Fast time library☆20Jul 1, 2025Updated 10 months ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆11Jul 8, 2018Updated 7 years ago
- Codes and data for KDD 2024 Research Track paper "ProCom: A Few-shot Targeted Community Detection Algorithm"☆11Aug 15, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- 腾讯云黑客松 - 智能渗透挑战赛 #10☆40Dec 12, 2025Updated 4 months ago
- Benchmarks for the k-FP WF attack☆33Aug 24, 2016Updated 9 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆20Dec 30, 2024Updated last year
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- ☆19Feb 22, 2017Updated 9 years ago