PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 5 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆64Updated 9 months ago
- Some YARA rules i will add from time to time☆66Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Updated 2 years ago
- Code for shelLM tool☆57Updated last year
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- File analysis and management framework.☆92Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- Notes and IoCs of fresh malware☆59Updated last year
- ☆25Updated 2 years ago
- ☆44Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- Malware Sandboxes & Malware Source☆108Updated 8 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- ☆54Updated 2 years ago
- Python scripts for Malware Bazaar☆157Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 7 months ago
- Everything related to YARA☆15Updated 4 months ago
- An Adaptive Misuse Detection System☆46Updated last year
- Tools to interact with APTnotes reporting/index.☆108Updated 5 years ago
- C2 Active Scanner☆59Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- Python based CLI for MalwareBazaar☆39Updated 6 months ago
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- ☆37Updated 7 months ago