Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- ☆13Mar 26, 2026Updated last month
- IPFS☆16Apr 4, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆13Dec 21, 2024Updated last year
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆22Sep 22, 2025Updated 7 months ago
- ☆13Jul 6, 2023Updated 2 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- ☆42Feb 18, 2026Updated 2 months ago
- The FASTEST way to consume threat intel.☆69May 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- Convert your HackerOne reports into reusable AI skills.☆91Mar 9, 2026Updated last month
- Simple Wordsearch Solving Python Script☆12Jul 8, 2018Updated 7 years ago
- ☆19Mar 31, 2019Updated 7 years ago
- ☆20Sep 24, 2025Updated 7 months ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- API Utility for TOR(The Onion ROUTER) such as requesting a new IP, or generating API password. Uses Network API for control☆12Feb 27, 2025Updated last year
- A framework of graph classification baselines which including TUDataset Loader, GNN models and visualization.☆16Jun 19, 2024Updated last year
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- SEETF 2023 Public Challenge Files, Sources, and Solutions☆18Jun 18, 2023Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆18Oct 30, 2017Updated 8 years ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆22Apr 12, 2024Updated 2 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆41Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆25Dec 10, 2022Updated 3 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆35Mar 31, 2019Updated 7 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago