☆26Jun 25, 2021Updated 4 years ago
Alternatives and similar repositories for datasets
Users that are interested in datasets are comparing it to the libraries listed below
Sorting:
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- ☆136Jun 17, 2020Updated 5 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆42Apr 23, 2020Updated 5 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- ☆28Jan 30, 2026Updated last month
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- ☆21Dec 22, 2021Updated 4 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆552May 6, 2025Updated 10 months ago
- ☆47Updated this week
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated last month
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- ☆11May 3, 2019Updated 6 years ago