This repository contains scripts and dataset for a Apt Identification Triage System
☆17Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for I_F_Identifier
Users that are interested in I_F_Identifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Apr 5, 2022Updated 4 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 10 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 8 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- Simple reliable transport (Cal EE 122 Project 1, Fall 2011)☆11Oct 11, 2013Updated 12 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- ☆17Dec 30, 2023Updated 2 years ago
- ☆11May 24, 2022Updated 3 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆26Jul 25, 2023Updated 2 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Morion is a PoC tool to experiment with symbolic execution on real-word (ARMv7) binaries.☆15Oct 3, 2024Updated last year
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆15Feb 10, 2022Updated 4 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- 一款集合了常见的漏洞练习平台,利用Ai对靶场进行自动化渗透测试!☆43Oct 22, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reinforcement learning training framework for entity-gym environments.☆17Mar 18, 2024Updated 2 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- Research on cybersecurity data usage in research papers☆15Dec 15, 2017Updated 8 years ago
- ☆29Apr 18, 2024Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- Collection of materials and code samples on reinforcement learning / optimal control and game theory☆24Apr 5, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆36Mar 31, 2025Updated last year
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- 学生运动会管理系统☆12Jun 26, 2021Updated 4 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- Docker file templates for GZCTF, including crypto, pwn, web.☆21Aug 10, 2023Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆63Nov 7, 2024Updated last year