PritomDas / Cyber-Attack-Attribution-with-Machine-Learning
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆14Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning:
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated last month
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- An Adaptive Misuse Detection System☆38Updated 4 months ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- Code for shelLM tool☆51Updated 2 months ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated last month
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- Maco - Malware config extractor framework☆32Updated 3 weeks ago
- A Maltego transform for VirusTotal vHash☆32Updated 5 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- ☆23Updated 11 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆32Updated 10 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆35Updated last year
- malicious PowerShell script detection model☆38Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated last month
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Collection of YARA signatures from individual research☆44Updated last year
- A MITRE Caldera plugin☆42Updated 4 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago