Stars
Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.
MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armed bandit (MAB) problem, by treating each action-content pair…
Graph convolutional networks (GCN), graphSAGE and graph attention networks (GAT) for text classification
Automatic extract anomalious Web attack Payloads with Unsupervised Machine Learning algorithms
Heterogeneous graph attention network for semi-supervised short text classification (EMNLP 2019, TOIS 2021)
[ACL 2020] Tensorflow implementation for "Every Document Owns Its Structure: Inductive Text Classification via Graph Neural Networks"
Graph Convolutional Networks for Text Classification. AAAI 2019
Powerful Python tool to analyze PDF documents
An awesome & curated list of binary code similarity papers
VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary
SAFE: Self-Attentive Function Embeddings for binary similarity
Source code for Hidost experiment reproduction
PowerSploit - A PowerShell Post-Exploitation Framework
Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
A Tool To Leverage Virus Total's Private API Key
Repository to replicate the experiments presented in 'Towards an Interpretable Deep Learning Model for Mobile Malware Detection and Family Identification' by Iadarola G. et al.
VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls
The FLARE team's open-source tool to identify capabilities in executable files.
Indicators of Compromises (IOC) of our various investigations