A library for adversarial classifier evasion
☆43Dec 4, 2014Updated 11 years ago
Alternatives and similar repositories for mimicus
Users that are interested in mimicus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 31, 2024Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Code related to "Learning Continuous Semantic Representations of Symbolic Expressions" project.☆35Dec 8, 2016Updated 9 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆16Mar 5, 2018Updated 8 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆52Jul 4, 2019Updated 6 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- 腾讯云黑客松 - 智能渗透挑战赛 #10☆32Dec 12, 2025Updated 3 months ago
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- ideally, this will become a pure Haskell library for Linear Integer/Mixed Programming☆16Nov 12, 2018Updated 7 years ago
- Fast time library☆20Jul 1, 2025Updated 8 months ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Codes and data for KDD 2024 Research Track paper "ProCom: A Few-shot Targeted Community Detection Algorithm"☆11Aug 15, 2024Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Chrome Extension for replacing images in your current tab, different categories available!☆12Dec 20, 2022Updated 3 years ago