MohamedMostafa010/ExeRay
ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
This tool helps cybersecurity analysts and incident responders quickly identify malicious Windows executable files. You input suspicious `.exe` files, and it uses AI to analyze their hidden characteristics like code structure, imported functions, and metadata. The output tells you if a file is likely malware, providing a detailed report on suspicious behaviors, helping you prioritize and respond to threats faster.
Use this if you need an automated, fast way to screen Windows executable files for potential malware without executing them, aiding in incident response or pre-deployment checks.
Not ideal if you need to analyze macOS, Linux, or other file types beyond Windows executables, or if you require deep behavioral analysis that involves executing the files in a sandbox.
Stars
60
Forks
6
Language
Python
License
MIT
Category
Last pushed
Feb 07, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/MohamedMostafa010/ExeRay"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
rednaga/APKiD
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
0xfke/Malware-Detection-and-Analysis-using-Machine-Learning
Malware🦠Detection and Analysis using Machine Learning (MDAML) is designed to provide users with...
rieck/malheur
A Tool for Automatic Analysis of Malware Behavior
AFAgarap/malware-classification
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support...
CalebFenton/apkfile
Android app analysis and feature extraction library