MohamedMostafa010/ExeRay

ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.

44
/ 100
Emerging

This tool helps cybersecurity analysts and incident responders quickly identify malicious Windows executable files. You input suspicious `.exe` files, and it uses AI to analyze their hidden characteristics like code structure, imported functions, and metadata. The output tells you if a file is likely malware, providing a detailed report on suspicious behaviors, helping you prioritize and respond to threats faster.

Use this if you need an automated, fast way to screen Windows executable files for potential malware without executing them, aiding in incident response or pre-deployment checks.

Not ideal if you need to analyze macOS, Linux, or other file types beyond Windows executables, or if you require deep behavioral analysis that involves executing the files in a sandbox.

cybersecurity incident-response malware-analysis threat-detection security-operations
No Package No Dependents
Maintenance 10 / 25
Adoption 8 / 25
Maturity 15 / 25
Community 11 / 25

How are scores calculated?

Stars

60

Forks

6

Language

Python

License

MIT

Last pushed

Feb 07, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/MohamedMostafa010/ExeRay"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.