vusec / minesweeperLinks
Tools used for MineSweeper project
☆32Updated 4 years ago
Alternatives and similar repositories for minesweeper
Users that are interested in minesweeper are comparing it to the libraries listed below
Sorting:
- The data and data used in OutGuard☆8Updated 5 years ago
- the repo for cmtracker☆22Updated 6 years ago
- ☆29Updated 3 years ago
- ☆22Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆47Updated 5 years ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- ☆76Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 11 months ago
- IoT Security Reading List☆62Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆82Updated 5 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆176Updated last year
- ☆44Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 5 months ago
- Drebin - NDSS 2014 Re-implementation☆107Updated 7 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 7 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- ☆22Updated last year
- AVClass malware labeling tool☆474Updated 7 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆13Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆63Updated 11 months ago
- Codes for WF attacks, defenses☆83Updated last year
- ☆10Updated 4 years ago
- Automatic Feature Generation for Website Fingerprinting☆31Updated 8 years ago
- ☆99Updated 7 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago