GiuseppeLaurenza / dAPTasetLinks
a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustive dataset
☆16Updated 2 years ago
Alternatives and similar repositories for dAPTaset
Users that are interested in dAPTaset are comparing it to the libraries listed below
Sorting:
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆38Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated 2 months ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆17Updated last week
- malicious PowerShell script detection model☆40Updated 3 years ago
- Interactive, dynamic, and realistic LLM honeypots☆52Updated 5 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- ☆13Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆46Updated 9 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Dataset used in WAF-A-MoLE paper☆9Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆35Updated 3 weeks ago
- Adversarial Malware Generator Using GANs☆54Updated 11 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated 11 months ago
- A Python 3 library to interact with VirusShare API v2.☆17Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆68Updated 4 years ago
- ☆25Updated 4 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆24Updated 2 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Updated 5 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Maco - Malware config extractor framework☆36Updated this week
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆11Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 3 months ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Updated 6 years ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago