teamnsrg / outguard
The data and data used in OutGuard
☆8Updated 5 years ago
Alternatives and similar repositories for outguard
Users that are interested in outguard are comparing it to the libraries listed below
Sorting:
- Tools used for MineSweeper project☆31Updated 4 years ago
- the repo for cmtracker☆22Updated 6 years ago
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- ☆29Updated 3 years ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- ☆22Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆83Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- ☆76Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Popular Android malware datasets☆154Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 11 months ago
- Identifying and Explaining Similarities in Android Apps☆27Updated 6 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆42Updated 5 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Updated 5 years ago
- ☆31Updated last year
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆69Updated 4 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆74Updated 3 years ago
- ☆22Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- JavaScript Transformation Techniques Detection☆10Updated 3 years ago
- ☆10Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆86Updated 2 years ago