PritomDas / Cyber-Attack-Attribution-with-Machine-LearningLinks
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Updated 4 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Python scripts for Malware Bazaar☆156Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- ☆25Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆99Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Updated last year
- An Adaptive Misuse Detection System☆44Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 5 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆61Updated 6 months ago
- Code for shelLM tool☆56Updated 9 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 6 months ago
- Community modules for CAPE Sandbox☆105Updated 3 weeks ago
- Python based CLI for MalwareBazaar☆38Updated 3 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆18Updated 7 months ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆88Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- File analysis and management framework.☆90Updated 2 years ago
- C2 Active Scanner☆60Updated last year
- Collection of YARA signatures from individual research☆46Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆152Updated 5 months ago