A library for adversarial classifier evasion
☆43Dec 4, 2014Updated 11 years ago
Alternatives and similar repositories for mimicus
Users that are interested in mimicus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 31, 2024Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Code related to "Learning Continuous Semantic Representations of Symbolic Expressions" project.☆35Dec 8, 2016Updated 9 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆36Mar 31, 2025Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Scripts to automatically create VM images☆15Mar 29, 2026Updated 2 weeks ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16Mar 5, 2018Updated 8 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆53Jul 4, 2019Updated 6 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Android Security☆29Mar 14, 2014Updated 12 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- 腾讯云黑客松 - 智能渗透挑战赛 #10☆36Dec 12, 2025Updated 4 months ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- Codes and data for KDD 2024 Research Track paper "ProCom: A Few-shot Targeted Community Detection Algorithm"☆11Aug 15, 2024Updated last year
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆19Dec 30, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- 自己调的网络☆11Sep 5, 2019Updated 6 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- convert luac to lua source☆15Dec 20, 2024Updated last year
- Automatically exported from code.google.com/p/jbirch☆12Sep 6, 2022Updated 3 years ago