GeekOnlineCode / Malware-Machine-Learning
Malware Machine Learning
☆27Updated 6 years ago
Alternatives and similar repositories for Malware-Machine-Learning:
Users that are interested in Malware-Machine-Learning are comparing it to the libraries listed below
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- IoC's, PCRE's, YARA's etc☆23Updated this week
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- A simple tool to organise large malicious/benign files into a organised Structure.☆1Updated 6 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆47Updated 5 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆27Updated 5 years ago
- ☆52Updated 9 years ago
- ☆27Updated 7 years ago
- A curated list of awesome malware analysis tools and resources☆45Updated 4 years ago
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- ☆15Updated 4 years ago