boozallen / MOTIFLinks
☆161Updated 3 years ago
Alternatives and similar repositories for MOTIF
Users that are interested in MOTIF are comparing it to the libraries listed below
Sorting:
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆349Updated 7 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆460Updated 2 months ago
- Malware repository component for samples & static configuration with REST API interface.☆374Updated last week
- Python scripts for Malware Bazaar☆157Updated last year
- ☆37Updated 7 months ago
- A guide on how to write fast and memory friendly YARA rules☆163Updated 11 months ago
- MBC content in markdown☆520Updated 7 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- IOC from articles, tweets for archives☆318Updated 2 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆240Updated 2 years ago
- ☆215Updated 8 months ago
- YARA malware query accelerator (web frontend)☆437Updated 4 months ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated 3 weeks ago
- Automatic YARA rule generation for Malpedia☆165Updated 3 years ago
- Malware Sandboxes & Malware Source☆109Updated 8 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated 3 weeks ago
- YARA Rules I come across on the internet☆358Updated last year
- ☆129Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆76Updated 3 months ago
- ☆63Updated 4 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆683Updated this week
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆339Updated 11 months ago
- Various capabilities for static malware analysis.☆79Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆690Updated 4 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- Community modules for CAPE Sandbox☆110Updated this week
- Collection of private Yara rules.☆378Updated last week
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated 2 months ago