FutureComputing4AI / ClarAVy
☆30Updated last month
Alternatives and similar repositories for ClarAVy
Users that are interested in ClarAVy are comparing it to the libraries listed below
Sorting:
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- ☆148Updated 2 years ago
- Code for shelLM tool☆51Updated 3 months ago
- Transformer Neural Network from Dynamic Malware Detection☆30Updated 10 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆50Updated 3 weeks ago
- Security ML models encoded as Yara rules☆214Updated last year
- Augmentation to Machine Readable CTI☆31Updated last week
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- ☆58Updated 4 years ago
- A yara based MCP Server☆12Updated last week
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated last week
- ☆36Updated last year
- JPCERT/CC public YARA rules repository☆106Updated 5 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆220Updated 3 weeks ago
- Elastic Security Labs releases☆63Updated last month
- ☆104Updated 11 months ago
- Community modules for CAPE Sandbox☆96Updated 3 weeks ago
- ☆88Updated 3 months ago
- YARA rule analyzer to improve rule quality and performance☆100Updated last month
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- Collection of rules created using YARA-Signator over Malpedia☆128Updated 6 months ago
- ☆22Updated 3 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆24Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆18Updated last year