恶意软件家族样本识别/分类器
☆13Aug 26, 2021Updated 4 years ago
Alternatives and similar repositories for MalwareFamilyIdentify
Users that are interested in MalwareFamilyIdentify are comparing it to the libraries listed below
Sorting:
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- ☆20Aug 19, 2017Updated 8 years ago
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Feb 21, 2020Updated 6 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- LaunchMON is a software infrastructure that enables HPC run-time tools to co-locate tool daemons with a parallel job. Its API allows a to…☆13Feb 11, 2026Updated 2 weeks ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- High Performance Computing Cluster Engineering Academy within Livermore Computing☆20Aug 7, 2025Updated 6 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Nov 18, 2020Updated 5 years ago
- Code for the ElasticSearch Cookbook Third Edition - targeting Elasticsearch 5.x☆13Jan 24, 2017Updated 9 years ago
- 金融市场基础知识思维导图课件☆12Sep 13, 2020Updated 5 years ago