toughie88 / malware-detection-machine-learning-approachView external linksLinks
python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms and choosing the best one for prediction by comparing their results.
☆11Feb 15, 2017Updated 9 years ago
Alternatives and similar repositories for malware-detection-machine-learning-approach
Users that are interested in malware-detection-machine-learning-approach are comparing it to the libraries listed below
Sorting:
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Apr 2, 2021Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Oct 10, 2016Updated 9 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Root app for Motorola devices to backup, restore, or flash new .ISO images into the 'CD-ROM' partition.☆10Aug 25, 2017Updated 8 years ago
- Android clone☆10Jul 6, 2023Updated 2 years ago
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- 这是朴素贝叶斯的代码实现 包括三种模型 高斯模型 多项式模型 伯努利模型☆10Mar 7, 2018Updated 7 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- ☆12Aug 4, 2025Updated 6 months ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- Standalone RandomX CPU miner for XDAG (Dagger Coin)☆12Apr 10, 2023Updated 2 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- This repository is for the paper of ICSE 2023: Regression Fuzzing for Deep Learning Systems☆12Feb 21, 2024Updated last year
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- opsi-script aka. opsi-winst and other various tools.☆10Updated this week
- Includes Kernel-mode driver source and usermode control application that sends requests to the hijacked device control, enjoy. Released t…☆12Oct 30, 2020Updated 5 years ago
- ☆10Feb 26, 2021Updated 4 years ago
- Forked from upstream: http://sourceforge.net/projects/osslsigncode/☆11Dec 27, 2021Updated 4 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 4 months ago
- Official PyTorch implementation for Revisiting LRP: Positional Attribution as the Missing Ingredient for Transformer Explainability [Neur…☆13Jul 7, 2025Updated 7 months ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- A simple implementation of the Karatsuba multiplication algorithm☆11Apr 2, 2025Updated 10 months ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆14Jul 15, 2025Updated 7 months ago
- SAveRUNNER (Searching off-lAbel dRUg aNd NEtwoRk) - a network-based approach for drug repurposing☆11Nov 27, 2024Updated last year
- In this notebook, we will create an AI and time serie driven forecasting engine based on a set of 5 AI models and 5 time series models an…☆14Jun 12, 2021Updated 4 years ago