Navein / Cuckoo2MIST
MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆13Updated 7 years ago
Alternatives and similar repositories for Cuckoo2MIST:
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
- ☆14Updated 6 years ago
- ☆77Updated 5 years ago
- ☆50Updated 9 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆85Updated 9 months ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆80Updated 4 years ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆90Updated 2 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- Malware Machine Learning☆27Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆19Updated 7 years ago
- ☆58Updated 4 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 7 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- ☆9Updated 7 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 2 years ago
- IoT Security Reading List☆62Updated 4 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- RNN implementation with Keras for machine activity data to predict malware☆41Updated last year
- Malware detection demo using machine learning.☆25Updated 7 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆76Updated 8 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago