Navein / Cuckoo2MISTLinks
MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆13Updated 7 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- Automated Yara Rule generation using Biclustering☆68Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆75Updated 8 years ago
- Set of tools for interacting with Malshare☆156Updated 5 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆90Updated 2 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- ☆79Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- Malware Detection and Classification Using Machine Learning☆340Updated 8 years ago
- ☆98Updated 4 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆79Updated 4 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- ☆59Updated 4 years ago
- Free Malware Training Datasets for Machine Learning☆233Updated 4 years ago
- Automated malware unpacker☆120Updated 9 years ago
- Yet Another YARA rule Generator☆63Updated 6 years ago
- ☆44Updated 6 years ago
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- ☆52Updated 10 years ago
- ☆43Updated 6 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- ☆17Updated last year
- ☆9Updated 7 years ago
- Parse YARA rules and operate over them more easily.☆191Updated 5 months ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- IoT Security Reading List☆63Updated 5 years ago