Te-k / malware-classification
Data and code for malware classification using machine learning (for fun, not production)
☆39Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for malware-classification
- Malware Machine Learning☆27Updated 6 years ago
- A Python library to interface with a cuckoo-modified instance☆21Updated 8 years ago
- A Python malware analysis library.☆50Updated last year
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 5 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆20Updated 5 years ago
- Python OpenIOC Editor☆17Updated 8 years ago
- ☆42Updated 4 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 5 years ago
- ☆41Updated 6 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- a collection of public yara rules☆26Updated 5 years ago
- ☆14Updated 6 years ago
- Static and Dynamic Analysis Added☆9Updated 7 years ago
- Malware.lu configuration extractor☆24Updated 10 years ago
- ☆17Updated last year
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 3 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆79Updated 9 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago