Navein / Cuckoo2MISTLinks
MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆14Updated 7 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- Free Malware Training Datasets for Machine Learning☆239Updated 5 years ago
- Malware Detection and Classification Using Machine Learning☆341Updated 8 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Updated 2 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆94Updated 3 years ago
- ☆13Updated 7 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Updated 5 years ago
- ☆80Updated 6 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- ☆50Updated 9 years ago
- AVClass malware labeling tool☆481Updated last year
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- RNN implementation with Keras for machine activity data to predict malware☆43Updated last year
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Updated 9 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- IoT Security Reading List☆62Updated 5 years ago
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373Updated 6 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- ☆161Updated 3 years ago
- Pytorch implementation of MalConv☆72Updated 3 years ago
- Cuckoo Sandbox Dockerfile☆332Updated 5 years ago
- Automatic Yara Rule Generation☆334Updated 9 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- ☆25Updated 4 years ago
- Set of tools for interacting with Malshare☆159Updated 5 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆356Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆76Updated 3 months ago