Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf
☆19May 21, 2018Updated 7 years ago
Alternatives and similar repositories for MalConv-Adversarial
Users that are interested in MalConv-Adversarial are comparing it to the libraries listed below
Sorting:
- 基于深度学习的恶意软件检测研究;MalConv;☆118Jun 22, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆19May 28, 2021Updated 4 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 10 months ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆77Oct 8, 2025Updated 5 months ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago
- ☆38Aug 8, 2024Updated last year
- A neural approach to malware detection in portable executables☆80Mar 20, 2023Updated 2 years ago
- ☆12May 30, 2019Updated 6 years ago
- Code for testing Deep Learning models for crack detection with CrackForest Dataset, and the Aigle-RN and ESAR datasets☆11Oct 21, 2020Updated 5 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- 微信聊天记录分析器☆12Apr 22, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- ☆164Oct 27, 2022Updated 3 years ago
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆172Oct 1, 2020Updated 5 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- Dynamic analysis tool to find memory overlaps in an executable☆10Apr 25, 2022Updated 3 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- ☆11Jun 15, 2022Updated 3 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago