PritomDas / Cyber-Attack-Attribution-with-Machine-Learning
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆14Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning:
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated last month
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- A Python 3 library to interact with VirusShare API v2.☆16Updated 4 years ago
- An Adaptive Misuse Detection System☆38Updated 4 months ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- ☆13Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- ☆21Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- ☆25Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated last year
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated last month
- Static and Dynamic Analysis of Malware Samples☆11Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- ☆23Updated 11 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆32Updated 10 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- A MITRE Caldera plugin☆42Updated 4 months ago
- ☆35Updated last year