MAB-malware
Malware attacker tool
An open-source reinforcement learning framework to generate adversarial examples for malware classification models.
MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armed bandit (MAB) problem, by treating each action-content pair as an independent slot machine.
40 stars
2 watching
5 forks
Language: Python
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
marcoramilli/malwaretrainingsets | Provides machine learning datasets for malware analysis | 225 |
bfilar/malware_rl | Enabling research into malware bypass using reinforcement learning environments | 102 |
outflanknl/evilclippy | An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,130 |
13o-bbr-bbq/machine_learning_security | A collection of tools and techniques for applying machine learning to improve security in software applications | 1,979 |
michaelweber/macrome | A tool used to create and manipulate Excel documents containing malicious macros. | 513 |
accidentalrebel/mbcscan | Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding | 20 |
mitre/advmlthreatmatrix | A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,050 |
rieck/malheur | A tool for automatically analyzing malware behavior and identifying patterns and classes. | 368 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
zhengmin1989/droidanalytics | An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
diogo-fernan/malsub | A Python framework that provides an API interface to multiple online services for analyzing malware and threat intelligence | 368 |
m0nad/hellraiser | Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
cyb3rmx/qu1cksc0pe | A comprehensive tool for analyzing suspicious files and detecting malware characteristics. | 1,320 |
vernamlab/medusa | Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols | 18 |
markcyber/badusb | A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 44 |