PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Code for shelLM tool☆55Updated 8 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- ☆25Updated 2 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 4 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 5 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆61Updated 5 months ago
- An Adaptive Misuse Detection System☆44Updated 11 months ago
- ☆56Updated 6 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆18Updated 6 months ago
- Python scripts for Malware Bazaar☆154Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- ☆40Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- File analysis and management framework.☆88Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆40Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- C2 Active Scanner☆60Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆52Updated last month
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- ☆25Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Collection of YARA signatures from individual research☆45Updated last year