[SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature
☆20Sep 14, 2018Updated 7 years ago
Alternatives and similar repositories for PC-Malware-Sklearner
Users that are interested in PC-Malware-Sklearner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Concurrency Paper☆115Jun 1, 2023Updated 2 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- [ICSE2020] MemLock: Memory Usage Guided Fuzzing☆71Dec 6, 2021Updated 4 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 14 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- 谷歌2011年开始开发的一款专注于速度的压缩,解压库,速度完胜zlib。☆14Apr 28, 2018Updated 7 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆36Oct 9, 2022Updated 3 years ago
- A C++ class to protect data that is read frequently in a multi-threaded program without using locks.☆20Jan 17, 2016Updated 10 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Oct 29, 2019Updated 6 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- A Quick Research of Active Automata Learning☆32Mar 13, 2020Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- C++编写的Com组件,实现了内存读写、窗口控制、输入模拟、文本编码、颜色拾取、文件读写、正则转换、XML读写等功能☆22Feb 20, 2017Updated 9 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Summary of static analysis in Java and C/C++☆18Aug 11, 2022Updated 3 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- ☆14May 1, 2021Updated 4 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- 参照着OLLVM写的一个混淆库,只要机器上有装LLVM,就可以直接编译拿来用☆55Feb 28, 2018Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago