boozallen / MOTIFView external linksLinks
☆164Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for MOTIF
Users that are interested in MOTIF are comparing it to the libraries listed below
Sorting:
- ☆11Jun 15, 2022Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- ☆18Mar 15, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆29Mar 15, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Python implementation of the LZJD algorithm☆32Jul 10, 2025Updated 7 months ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 2 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,124Nov 22, 2024Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Dec 2, 2021Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- ☆28Oct 21, 2020Updated 5 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- ReversingLabs YARA Rules☆895Nov 3, 2025Updated 3 months ago
- ☆33Feb 26, 2022Updated 3 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Sep 22, 2025Updated 4 months ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Jul 15, 2021Updated 4 years ago
- ☆21May 8, 2022Updated 3 years ago
- This is the official repository for VulHawk.☆74Mar 28, 2023Updated 2 years ago
- ☆113Sep 10, 2025Updated 5 months ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- JPCERT/CC public YARA rules repository☆110Nov 14, 2025Updated 3 months ago
- Evtx Log (xml) Browser☆57Mar 12, 2023Updated 2 years ago
- ☆38Jun 11, 2025Updated 8 months ago
- ☆54Sep 6, 2020Updated 5 years ago