AhsanAyub / irp-driven-ransomware-analysisLinks
This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware execution.
☆11Updated 4 years ago
Alternatives and similar repositories for irp-driven-ransomware-analysis
Users that are interested in irp-driven-ransomware-analysis are comparing it to the libraries listed below
Sorting:
- C# code of ECSM (AI 2016 conference)☆11Updated 8 years ago
- Vertex Ordering to List Triangles: a fast C++ tool for triangle counting or listing in big graphs. See associated paper: https://arxiv.or…☆15Updated 2 years ago
- Mining Relevant Fix Patterns for Automated Program Repair☆30Updated 2 years ago
- Exceptional Model Mining is a descriptive data mining technique to find interesting patterns in datasets. This package contains a Python …☆11Updated last year
- Machine Learning Ransomware Detection☆33Updated 7 years ago
- Describe data in terms of informative and concise sets of patterns☆11Updated 4 years ago
- ☆15Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Updated 4 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆11Updated 2 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆14Updated 8 months ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆21Updated last week
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- This is an automated transformation inference tool that leverages a big code corpus to guide the abstraction of transformation patterns.☆29Updated 3 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated 10 months ago
- Graph Pattern Mining☆89Updated 9 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆29Updated last year
- Malware Classification and Labelling using Deep Neural Networks☆36Updated 5 years ago
- Disassembly Generation and Processing for JARV1S☆14Updated last month
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- ☆14Updated 5 years ago
- Dataset of packed ELF samples☆19Updated 2 years ago
- ☆32Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 2 years ago
- LoCoMotif is a time series motif discovery method that discovers variable-length motif sets in multivariate time series using time warpin…☆26Updated last month
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- PAMI is a Python library containing 100+ algorithms to discover useful patterns in various databases across multiple computing platforms.…☆269Updated this week
- Python SPMF Wrapper 🐍 🎁☆67Updated last year