This repository contains scripts and dataset for a Apt Identification Triage System
☆17Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for I_F_Identifier
Users that are interested in I_F_Identifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆26Jun 25, 2021Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Simple reliable transport (Cal EE 122 Project 1, Fall 2011)☆11Oct 11, 2013Updated 12 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11May 24, 2022Updated 3 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆32Jan 28, 2020Updated 6 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Re-Implementation of SPARTA model☆13Oct 1, 2021Updated 4 years ago
- Produce code coverage reports for AFL++ fuzzing campaigns with source code or in binary-only mode☆33Jul 18, 2025Updated 8 months ago
- Reinforcement learning training framework for entity-gym environments.☆17Mar 18, 2024Updated 2 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- ☆28Apr 18, 2024Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- Collection of materials and code samples on reinforcement learning / optimal control and game theory☆24Mar 22, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Docker file templates for GZCTF, including crypto, pwn, web.☆21Aug 10, 2023Updated 2 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆34Nov 10, 2022Updated 3 years ago