boozallen / MOTIF
☆143Updated 2 years ago
Alternatives and similar repositories for MOTIF:
Users that are interested in MOTIF are comparing it to the libraries listed below
- MBC content in markdown☆394Updated last week
- Security ML models encoded as Yara rules☆213Updated last year
- Malduck is your ducky companion in malware analysis journeys☆323Updated 6 months ago
- Malware repository component for samples & static configuration with REST API interface.☆334Updated this week
- IOC from articles, tweets for archives☆312Updated last year
- Automatic YARA rule generation for Malpedia☆156Updated 2 years ago
- ☆22Updated last year
- ☆130Updated 11 months ago
- Python scripts for Malware Bazaar☆148Updated 7 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆397Updated 2 months ago
- Various capabilities for static malware analysis.☆75Updated 4 months ago
- c2 traffic☆189Updated last year
- A guide on how to write fast and memory friendly YARA rules☆127Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆100Updated 4 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆556Updated this week
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆37Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆120Updated 2 months ago
- ☆197Updated last year
- ☆97Updated last month
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆113Updated 2 years ago
- MAEC Schemas and Schema Development☆84Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆242Updated 2 years ago
- Sigma rules from Joe Security☆202Updated 2 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆145Updated 4 months ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 8 months ago
- YARA rule analyzer to improve rule quality and performance☆95Updated 3 weeks ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆236Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆199Updated 2 years ago