AhsanAyub / irp-driven-ransomware-analysis
This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware execution.
☆11Updated 4 years ago
Alternatives and similar repositories for irp-driven-ransomware-analysis:
Users that are interested in irp-driven-ransomware-analysis are comparing it to the libraries listed below
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Updated 4 years ago
- Describe data in terms of informative and concise sets of patterns☆11Updated 4 years ago
- C# code of ECSM (AI 2016 conference)☆11Updated 8 years ago
- Mining Relevant Fix Patterns for Automated Program Repair☆28Updated 2 years ago
- Higher-order genetic interaction discovery with network-based biological priors.☆13Updated last year
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆11Updated 2 years ago
- Machine Learning Ransomware Detection☆33Updated 7 years ago
- This is an automated transformation inference tool that leverages a big code corpus to guide the abstraction of transformation patterns.☆29Updated 2 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆14Updated 6 months ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated 8 months ago
- ☆13Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 6 months ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆21Updated 2 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- Malware Classification and Labelling using Deep Neural Networks☆35Updated 5 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- Ransomware Dataset for arXiv:1609.03020☆25Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Updated 8 years ago
- ☆31Updated 4 years ago
- ☆10Updated 2 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆25Updated last year
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- ☆22Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆80Updated last year
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year