PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- Code for shelLM tool☆55Updated 7 months ago
- ☆25Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Python scripts for Malware Bazaar☆154Updated last year
- Community modules for CAPE Sandbox☆103Updated 2 weeks ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆125Updated last year
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆96Updated last month
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- ☆25Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆13Updated last year
- Hatching Triage public command-line utility and API library.☆71Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- Source code used at TweetFeed.live☆44Updated 2 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆18Updated 5 months ago
- ☆34Updated last month
- Security ML models encoded as Yara rules☆213Updated 2 years ago
- A large-scale database of malicious software images☆48Updated 4 years ago
- C2 Active Scanner☆59Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago
- File analysis and management framework.☆86Updated 2 years ago