Framework for Adversarial Malware Evaluation.
☆35Mar 31, 2025Updated 11 months ago
Alternatives and similar repositories for FAME
Users that are interested in FAME are comparing it to the libraries listed below
Sorting:
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 10 months ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆244Nov 27, 2025Updated 3 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆22Oct 31, 2024Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- ☆50Jun 28, 2022Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- ☆21Feb 27, 2021Updated 5 years ago
- Software vulnerabilities data set☆25Mar 4, 2020Updated 6 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Nov 21, 2024Updated last year
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 2 years ago