PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 5 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- ☆25Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆64Updated 9 months ago
- ☆44Updated last year
- Tools to interact with APTnotes reporting/index.☆109Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- Source code used at TweetFeed.live☆48Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated 3 weeks ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 9 months ago
- Code for shelLM tool☆57Updated last year
- Python scripts for Malware Bazaar☆157Updated last year
- ☆25Updated 4 years ago
- Maco - Malware config extractor framework☆43Updated last week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆23Updated 10 months ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last month
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- Python based CLI for MalwareBazaar☆39Updated 6 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆57Updated last year
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- Graphics, icons, and diagrams to support STIX 2☆48Updated 4 years ago