Navein / Cuckoo2MIST
MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆13Updated 7 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- ☆14Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 10 months ago
- ☆50Updated 9 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- ☆79Updated 5 years ago
- ☆36Updated last year
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆90Updated 2 years ago
- ☆58Updated 4 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated last year
- ☆24Updated 3 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆169Updated 2 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- Free Malware Training Datasets for Machine Learning☆232Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆76Updated 8 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆80Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Parse YARA rules and operate over them more easily.☆188Updated 3 months ago
- Malware Data Science Reading Diary / Notes☆127Updated 6 years ago
- RNN implementation with Keras for machine activity data to predict malware☆42Updated last year
- Set of tools for interacting with Malshare☆153Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year