AhsanAyub / irp-driven-ransomware-analysis
This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware execution.
☆11Updated 4 years ago
Alternatives and similar repositories for irp-driven-ransomware-analysis:
Users that are interested in irp-driven-ransomware-analysis are comparing it to the libraries listed below
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆10Updated 4 years ago
- Vertex Ordering to List Triangles: a fast C++ tool for triangle counting or listing in big graphs. See associated paper: https://arxiv.or…☆15Updated 2 years ago
- Exceptional Model Mining is a descriptive data mining technique to find interesting patterns in datasets. This package contains a Python …☆11Updated 8 months ago
- Machine Learning Ransomware Detection☆33Updated 6 years ago
- C# code of ECSM (AI 2016 conference)☆11Updated 8 years ago
- ☆10Updated 4 years ago
- The shortest yet efficient implementation of the famous sequential pattern mining algorithm PrefixSpan in Scala.☆11Updated 7 years ago
- Mining Relevant Fix Patterns for Automated Program Repair☆26Updated 2 years ago
- LoCoMotif is a time series motif discovery method that discovers variable-length motif sets in multivariate time series using time warpin…☆20Updated last week
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆28Updated 6 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆42Updated 4 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated last year
- This is an automated transformation inference tool that leverages a big code corpus to guide the abstraction of transformation patterns.☆29Updated 2 years ago
- Describe data in terms of informative and concise sets of patterns☆11Updated 3 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆21Updated this week
- Graph Pattern Mining☆87Updated 5 months ago
- Malware Classification and Labelling using Deep Neural Networks☆34Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 3 years ago
- Educational ransomware for evaluating ransomware detection tools☆8Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆23Updated last year
- ☆21Updated 3 years ago
- A curated malware database with more then +73000 samples.☆17Updated 4 years ago
- PDF Malware Parser☆20Updated 8 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆14Updated last year
- ☆14Updated 6 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆16Updated 3 years ago