GiuseppeLaurenza / dAPTasetLinks
a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustive dataset
☆18Updated 3 years ago
Alternatives and similar repositories for dAPTaset
Users that are interested in dAPTaset are comparing it to the libraries listed below
Sorting:
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- ☆25Updated 4 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆55Updated 4 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆40Updated last week
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆76Updated 3 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆177Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Code for shelLM tool☆57Updated 11 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆51Updated 2 months ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- ☆131Updated 5 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 11 months ago
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Updated 5 years ago
- Community modules for CAPE Sandbox☆108Updated last week
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Adversarial Malware Generator Using GANs☆55Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- ☆44Updated last year
- ☆25Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆108Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆27Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 6 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago