Te-k / malware-classification
Data and code for malware classification using machine learning (for fun, not production)
☆39Updated 4 years ago
Alternatives and similar repositories for malware-classification:
Users that are interested in malware-classification are comparing it to the libraries listed below
- Malware Machine Learning☆27Updated 6 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- ☆14Updated 6 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- a collection of public yara rules☆26Updated 5 years ago
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 3 years ago
- A Python malware analysis library.☆50Updated last year
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Python OpenIOC Editor☆17Updated 9 years ago
- Static and Dynamic Analysis Added☆9Updated 8 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- A collection of Yara rules I have created so far☆16Updated 4 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆43Updated 4 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- Handy scripts to speed up malware analysis☆35Updated last year
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆27Updated 5 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 8 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆75Updated 8 years ago
- Additional material for the malware variants identification paper☆9Updated 5 years ago
- Collection of scripts for different malware analysis tasks☆76Updated 5 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆13Updated 7 years ago