AhsanAyub / irp-driven-ransomware-analysisLinks
This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware execution.
☆11Updated 4 years ago
Alternatives and similar repositories for irp-driven-ransomware-analysis
Users that are interested in irp-driven-ransomware-analysis are comparing it to the libraries listed below
Sorting:
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Updated 4 years ago
- C# code of ECSM (AI 2016 conference)☆11Updated 8 years ago
- Mining Relevant Fix Patterns for Automated Program Repair☆30Updated 2 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆11Updated 2 years ago
- Machine Learning Ransomware Detection☆33Updated 7 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- This is an automated transformation inference tool that leverages a big code corpus to guide the abstraction of transformation patterns.☆29Updated 2 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated 9 months ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆14Updated 8 months ago
- Vertex Ordering to List Triangles: a fast C++ tool for triangle counting or listing in big graphs. See associated paper: https://arxiv.or…☆15Updated 2 years ago
- ☆15Updated 5 years ago
- ☆11Updated 9 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Updated 5 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- Educational ransomware for evaluating ransomware detection tools☆8Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- PDF Malware Parser☆20Updated 9 years ago
- Ransomware Dataset for arXiv:1609.03020☆25Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- ☆10Updated 4 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆10Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆26Updated last year