davidzyx/HinDroid-with-Embeddings

Experiments on improving the HinDroid model

21
/ 100
Experimental

This project helps cybersecurity analysts and mobile security researchers to identify malicious Android applications more accurately and efficiently. It takes decompiled Android application code (Smali code) as input and provides an enhanced malware classification model with interpretable features. The primary users are security professionals focused on Android app analysis and threat intelligence.

No commits in the last 6 months.

Use this if you need to analyze Android applications for malware, desire more accurate classification, and require insights into why an application is flagged as malicious.

Not ideal if you are looking for a simple, out-of-the-box malware scanner without needing to understand the underlying classification features or integrate it into a larger analysis pipeline.

mobile-security android-malware-analysis threat-intelligence application-security cybersecurity-research
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 5 / 25
Maturity 16 / 25
Community 0 / 25

How are scores calculated?

Stars

9

Forks

Language

Jupyter Notebook

License

MIT

Last pushed

Jun 09, 2020

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/embeddings/davidzyx/HinDroid-with-Embeddings"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.