An evolutionary framework for evading machine learning-based malware classifiers.
☆111Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for EvadeML
Users that are interested in EvadeML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A general method for training cost-sensitive robust classifier☆22May 29, 2019Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130May 1, 2023Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- Kaggle 'Microsoft Malware Classification Challenge' 3rd place solution☆90May 5, 2015Updated 10 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- ☆117Aug 9, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Python SSDeep wrapper☆14Aug 27, 2018Updated 7 years ago
- ☆632Nov 21, 2022Updated 3 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Oct 16, 2017Updated 8 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Jan 12, 2018Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 4 years ago
- Metasploit for machine learning.☆571Mar 25, 2023Updated 3 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆18Mar 15, 2024Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Malware Detection and Classification Using Machine Learning☆345Jun 5, 2017Updated 8 years ago
- The C3, SMT/SAT solver written in C.☆35Aug 10, 2025Updated 7 months ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago