PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Code for shelLM tool☆57Updated 10 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- ☆25Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Malware detonation platform Polygon integration☆10Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Import Mitre Att&ck into Neo4j database☆38Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆37Updated 2 years ago
- Python scripts for Malware Bazaar☆157Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆107Updated 5 years ago
- Hatching Triage public command-line utility and API library.☆74Updated 2 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Updated last year
- Automated Yara Rule generation using Biclustering☆76Updated 2 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated 7 months ago
- Public repository for Red Canary Research☆37Updated 5 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆35Updated last month
- A collection of resources for security data☆41Updated 8 years ago
- Python based CLI for MalwareBazaar☆39Updated 4 months ago
- Malware Sandboxes & Malware Source☆102Updated 8 years ago
- ☆34Updated 4 years ago
- C2 Active Scanner☆60Updated last year
- Collection of YARA signatures from individual research☆45Updated 2 years ago