DeepMalwareDetector VS MDML

Compare DeepMalwareDetector vs MDML and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
DeepMalwareDetector MDML
1 1
65 40
- -
0.0 10.0
about 1 year ago over 1 year ago
Python Python
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

DeepMalwareDetector

Posts with mentions or reviews of DeepMalwareDetector. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-26.
  • Looking for insight on labelling portable executable (PE) malware files using a VirusTotal API response report.
    3 projects | /r/Malware | 26 Aug 2022
    What brought me to this research was these studies [1] [2], which demonstrates how image-based malware classification can be done using a CNN (convolutional neural network). Since I had a bit of a background with malware, and I recently completed a CNN model, I figured I would try to do something similar. It was only after investigating different materials I hit a bit of a roadblock. I found this one dataset, malimg [3], which is made up of PE files that have been converted into images already. I didn't want to just use the images, I wanted to demonstrate how to get them, only the method used to classify them turned out to be a bit out of my depth, kind of like this whole project, it's discussed in Section 4.2 of this paper [4] . There's also this set [5], which contains the pixel content for each file record. And as for the static disassembly you mention, I think you are right, the training data might not exist. During my investigation the best I could find was this study [6].

MDML

Posts with mentions or reviews of MDML. We have used some of these posts to build our list of alternatives and similar projects.

What are some alternatives?

When comparing DeepMalwareDetector and MDML you can also consider the following projects:

avclass - AVClass malware labeling tool

Bold-Falcon - 毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;

deepNOID - deepNOID, the binary music genre classifier which determines if what you're listening to really is NOIDED

APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android

tinysleepnet - TinySleepNet: An Efficient Deep Learning Model for Sleep Stage Scoring based on Raw Single-Channel EEG by Akara Supratak and Yike Guo from The Faculty of ICT, Mahidol University and Imperial College London respectively

DroidDetective - A machine learning malware analysis framework for Android apps.

Unredactor - In this project we are tryinbg to create unredactor. Unredactor will take a redacted document and the redacted flag as input, inreturn it will give the most likely candidates to fill in redacted location. In this project we are only considered about unredacting names only. The data that we are considering is imdb data set with many review files. These files are used to buils corpora for finding tfidf score. Few files are used to train and in these files names are redacted and written into redacted folder. These redacted files are used for testing and different classification models are built to predict the probabilies of each class. Top 5 classes i.e names similar to the test features are written at the end of text in unreddacted foleder.

IntelOwl - IntelOwl: manage your Threat Intelligence at scale

easyesn - Python library for Reservoir Computing using Echo State Networks

packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain

strelka - Real-time, container-based file scanning at enterprise scale

MalConv2 - Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection