Navein / Cuckoo2MISTLinks
MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆14Updated 7 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- Malware Detection and Classification Using Machine Learning☆341Updated 8 years ago
- Free Malware Training Datasets for Machine Learning☆237Updated 4 years ago
- ☆13Updated 7 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆80Updated 5 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆92Updated 2 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Updated 2 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Updated 9 years ago
- ☆79Updated 5 years ago
- Automatic Yara Rule Generation☆333Updated 9 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆148Updated 3 years ago
- Set of tools for interacting with Malshare☆158Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373Updated 6 years ago
- AVClass malware labeling tool☆480Updated last year
- ☆50Updated 9 years ago
- Security ML models encoded as Yara rules☆213Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- Module to convert Cuckoo .json to .mist☆10Updated 5 years ago
- Automated Yara Rule generation using Biclustering☆75Updated last month
- Repository of modules and signatures contributed by the community☆330Updated 2 years ago
- IoT Security Reading List☆62Updated 5 years ago
- Parse YARA rules and operate over them more easily.☆192Updated 9 months ago
- RNN implementation with Keras for machine activity data to predict malware☆42Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆252Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆88Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆353Updated 3 years ago
- ☆153Updated 6 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆181Updated 6 years ago