Trending repositories for topic malware-detection
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Collection of malware source code for a variety of platforms in an array of different programming languages.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Collection of malware source code for a variety of platforms in an array of different programming languages.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
A curated list of awesome malware analysis tools and resources
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
A curated list of awesome malware analysis tools and resources
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Collection of malware source code for a variety of platforms in an array of different programming languages.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
A curated list of awesome malware analysis tools and resources
Anomaly based Malware Detection using Machine Learning (PE and URL)
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
A curated list of awesome malware analysis tools and resources
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
Detection of IoT devices infected by malwares from their network communications, using federated machine learning
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Anomaly based Malware Detection using Machine Learning (PE and URL)
A curated dataset of malware and benign Windows executable samples for malware researchers
Collection of malware source code for a variety of platforms in an array of different programming languages.
Papers, code and datasets about deep learning for Android malware defenses and malware detection
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
This repository contains indicators of compromise (IOCs) of our various investigations.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with...
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Anomaly based Malware Detection using Machine Learning (PE and URL)
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We al...
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containe...
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
Anomaly based Malware Detection using Machine Learning (PE and URL)
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all unobfuscated grabbers
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Android Malware Detection Using Machine Learning Project with Source Code and Documents Plus Video Explanation
A curated list of awesome malware analysis tools and resources
ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perform malware detection in PDFs.
Final Year Malware Detection Project with PPT, Research Paper, code and Synopsis. Malware detection project by Machine Learning ALgorithms.
Malware-Detection-System-Using-Deep-Learning-Project. Project Includes PPT. Code, Explanation Video and Documents
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another computer. This repo is a collection of fun little viruses that pack a...
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat D...
Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD services. It can be used to prevent supply chain attacks, detec...
Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"