Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last week
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- ☆13Mar 26, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- Convert your HackerOne reports into reusable AI skills.☆84Mar 9, 2026Updated last month
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆42Feb 18, 2026Updated last month
- ACT documentation repo☆18May 22, 2024Updated last year
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- A Windows Tool for backing up and restoring Chrome's encrypted cookies☆12Apr 26, 2019Updated 6 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Simple Wordsearch Solving Python Script☆12Jul 8, 2018Updated 7 years ago
- ☆20Sep 24, 2025Updated 6 months ago
- ☆19Mar 31, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 4 months ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Python3 implementation of the paper [Large-scale optimal transport map estimation using projection pursuit]☆15Feb 24, 2021Updated 5 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- National information around the world,including longitude 、latitude、continent、Country code and name,etc See the script description for de…☆17Jan 8, 2022Updated 4 years ago
- We propose a density-based estimator for weighted geodesic distances suitable for data lying on a manifold of lower dimension than ambien…☆17Nov 15, 2018Updated 7 years ago
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- SEETF 2023 Public Challenge Files, Sources, and Solutions☆18Jun 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- ☆21Apr 1, 2020Updated 6 years ago
- Dump messages and media info from list of Telegram channels to CSV and monitor for changes☆32Jan 21, 2020Updated 6 years ago
- A minimal ngrok liked reverse proxy implemented in Rust for educational purpose.☆14Jul 23, 2023Updated 2 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago