-
Updated
Nov 30, 2020 - Assembly
malware-detection
Here are 225 public repositories matching this topic...
-
Updated
Nov 24, 2020
-
Updated
Oct 27, 2020 - Python
-
Updated
Nov 20, 2020 - YARA
-
Updated
Sep 9, 2020 - Python
-
Updated
Nov 18, 2019
-
Updated
Jul 27, 2020 - Python
-
Updated
Aug 16, 2020 - HTML
-
Updated
Nov 3, 2019 - C++
-
Updated
Feb 7, 2019
-
Updated
Oct 12, 2020 - Python
-
Updated
Nov 29, 2020 - Python
-
Updated
Nov 26, 2020 - YARA
-
Updated
Sep 30, 2020 - Java
-
Updated
Nov 30, 2020 - C++
-
Updated
Nov 30, 2020 - C++
-
Updated
Aug 21, 2019
-
Updated
Nov 28, 2020
-
Updated
Oct 12, 2020 - Python
-
Updated
Nov 12, 2020 - Python
-
Updated
Sep 20, 2020
-
Updated
Oct 13, 2020 - YARA
-
Updated
Oct 7, 2020 - Python
-
Updated
Jul 17, 2020 - Java
-
Updated
Jun 6, 2018 - Pascal
-
Updated
Dec 20, 2017 - Python
-
Updated
Nov 29, 2020 - Java
Improve this page
Add a description, image, and links to the malware-detection topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the malware-detection topic, visit your repo's landing page and select "manage topics."


Principally masc search for malware, but it also tries to fix some issues that compromises the website security, such as wrong permission in some files and directories, empty directories and known files that reveal some details about the software (README, LICENSE, . . .).
It would be interesting think about new security issues that masc could fix and include them in the cleanup_site method