Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.
☆40Jul 29, 2018Updated 7 years ago
Alternatives and similar repositories for MalwareGAN
Users that are interested in MalwareGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- 锁主页驱动☆42Mar 14, 2019Updated 7 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Using Unsupervised methods to identify anomalies in user behaviour through IP Profiling☆24Jul 28, 2019Updated 6 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 6 years ago
- ☆172Aug 29, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆30Feb 22, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Adversarial perturbations on word embeddings of BERT☆13Jan 17, 2021Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- 阿里云安全恶意程序检测比赛☆116Jan 15, 2021Updated 5 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- ☆59Mar 11, 2018Updated 8 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ARP+DNS欺骗工具,网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof☆38May 28, 2018Updated 7 years ago
- A FRONTEND Interfaces compliant device for the USRP that requires the UHD host code and supporting libraries to be installed☆16Sep 7, 2018Updated 7 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- 逆向小红伞杀毒软件驱动——avkmgr☆71Nov 27, 2017Updated 8 years ago
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Nov 15, 2017Updated 8 years ago
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- simple viewer for spectra☆17May 16, 2021Updated 4 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago