MAB-malware
Malware attacker tool
An open-source reinforcement learning framework to generate adversarial examples for malware classification models.
MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-armed bandit (MAB) problem, by treating each action-content pair as an independent slot machine.
41 stars
2 watching
5 forks
Language: Python
last commit: over 2 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Provides machine learning datasets for malware analysis | 227 |
| | Enabling research into malware bypass using reinforcement learning environments | 102 |
| | An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,131 |
| | An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| | A tool used to create and manipulate Excel documents containing malicious macros. | 514 |
| | Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding | 20 |
| | A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,056 |
| | A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
| | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 275 |
| | An Android malware analysis system designed to collect and analyze malware signatures using machine learning techniques. | 29 |
| | A Python framework that provides an API interface to multiple online services for analyzing malware and threat intelligence | 368 |
| | Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
| | An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| | Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols | 18 |
| | A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 |