vusec / minesweeper
Tools used for MineSweeper project
☆31Updated 3 years ago
Alternatives and similar repositories for minesweeper:
Users that are interested in minesweeper are comparing it to the libraries listed below
- The data and data used in OutGuard☆8Updated 5 years ago
- ☆22Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆79Updated 5 years ago
- the repo for cmtracker☆22Updated 6 years ago
- Modular static malicious JavaScript detection system☆67Updated 4 years ago
- ☆27Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 8 months ago
- AVClass malware labeling tool☆467Updated 4 months ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Updated 8 years ago
- IoT Security Reading List☆62Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 8 months ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆81Updated last year
- ☆10Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆14Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆46Updated 5 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆35Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- ☆50Updated 8 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆176Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- Drebin - NDSS 2014 Re-implementation☆105Updated 7 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- ☆24Updated 3 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆50Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆80Updated 2 years ago