Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆15Jan 15, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Attack-Attribution-with-Machine-Learning
Users that are interested in Cyber-Attack-Attribution-with-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- ☆13Mar 26, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆13Dec 21, 2024Updated last year
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆22Sep 22, 2025Updated 7 months ago
- ☆13Jul 6, 2023Updated 2 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- ☆42Feb 18, 2026Updated 3 months ago
- ACT documentation repo☆16May 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 6 years ago
- ☆18Aug 3, 2023Updated 2 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- Convert your HackerOne reports into reusable AI skills.☆96Mar 9, 2026Updated 2 months ago
- Simple Wordsearch Solving Python Script☆12Jul 8, 2018Updated 7 years ago
- ☆20Mar 31, 2019Updated 7 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline