zRapha / FAME
Framework for Adversarial Malware Evaluation.
☆33Updated last year
Alternatives and similar repositories for FAME:
Users that are interested in FAME are comparing it to the libraries listed below
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated last month
- Windows (ShadowMove) Socket Duplication☆80Updated 4 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- All in one - Malware + Analysis by Cylance☆11Updated 6 years ago
- ☆13Updated 2 years ago
- ☆24Updated 2 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆35Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Dataset of packed ELF samples☆19Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆65Updated last year
- My scripts to deobfuscate APT32 malware☆26Updated 2 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- ☆22Updated 10 months ago
- ☆15Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Malware Bypass Research using Reinforcement Learning☆105Updated 11 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- My Malware Analysis Reports☆20Updated 2 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- The malsource dataset☆10Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆36Updated 3 years ago
- ☆35Updated last year