GiuseppeLaurenza / dAPTasetLinks
a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustive dataset
☆16Updated 2 years ago
Alternatives and similar repositories for dAPTaset
Users that are interested in dAPTaset are comparing it to the libraries listed below
Sorting:
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆40Updated 3 years ago
- ☆25Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆168Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆98Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆27Updated 3 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆102Updated last year
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆78Updated 2 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆52Updated 2 months ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆203Updated 3 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆348Updated 2 years ago
- ☆124Updated 5 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 10 months ago
- A logic-based enterprise network security analyzer☆132Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆140Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- Code for shelLM tool☆56Updated 9 months ago
- malicious PowerShell script detection model☆42Updated 4 years ago
- Interactive, dynamic, and realistic LLM honeypots☆64Updated 8 months ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Updated 4 years ago
- ☆54Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- PCAP Samples for Different Post Exploitation Techniques☆366Updated 4 years ago
- ☆83Updated 2 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173Updated last year
- Automated Yara Rule generation using Biclustering☆74Updated 2 weeks ago