PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- Code for shelLM tool☆55Updated 7 months ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆125Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆48Updated 10 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- An Adaptive Misuse Detection System☆44Updated 10 months ago
- ☆25Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆58Updated 4 months ago
- ☆43Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆51Updated last week
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated 2 years ago
- Python scripts for Malware Bazaar☆154Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆17Updated 5 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 4 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Community modules for CAPE Sandbox☆101Updated last week
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆21Updated last month
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆48Updated 11 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- A MITRE Caldera plugin☆45Updated 9 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆13Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- Security ML models encoded as Yara rules☆213Updated 2 years ago