FutureComputing4AI / ClarAVyLinks
☆37Updated 6 months ago
Alternatives and similar repositories for ClarAVy
Users that are interested in ClarAVy are comparing it to the libraries listed below
Sorting:
- ☆161Updated 3 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- Transformer Neural Network from Dynamic Malware Detection☆38Updated last month
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆28Updated last year
- Security ML models encoded as Yara rules☆216Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆76Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆161Updated 10 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆263Updated this week
- Collection of rules created using YARA-Signator over Malpedia☆140Updated last year
- A yara based MCP Server☆17Updated this week
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆62Updated 8 months ago
- Augmentation to Machine Readable CTI☆37Updated 3 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆240Updated 3 weeks ago
- A specification and style guide for YARA rules☆63Updated last year
- ☆149Updated 2 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 10 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 11 months ago
- Community modules for CAPE Sandbox☆107Updated last week
- ☆44Updated last year
- ATT&CK Evaluations Library☆89Updated 2 weeks ago
- Code for shelLM tool☆57Updated 10 months ago
- Elastic Security Labs releases☆81Updated last month
- A curated dataset of malware and benign Windows executable samples for malware researchers☆51Updated last month
- ☆11Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆54Updated 4 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆35Updated last month
- File analysis and management framework.☆92Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆55Updated last year