Code for Benchmarking two ML Approaches performing Authorship Attribution
☆42Apr 5, 2022Updated 4 years ago
Alternatives and similar repositories for APTAttribution
Users that are interested in APTAttribution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆374Nov 10, 2022Updated 3 years ago
- ☆17Jul 17, 2021Updated 4 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- ☆49Mar 1, 2022Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Code to reproduce experiments from the EACL 2017 paper Continouos N-gram representation for Authorship Attribution☆12Feb 6, 2017Updated 9 years ago
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- ☆11Jun 13, 2020Updated 5 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆968Feb 28, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆98Oct 7, 2020Updated 5 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 11 months ago
- ☆25Dec 10, 2022Updated 3 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- 17条检测cobaltstrike的suricata-ids规则☆68Jun 20, 2022Updated 3 years ago
- Frontend for MalShare.com☆18Apr 25, 2026Updated last week
- ☆20Mar 31, 2019Updated 7 years ago
- ☆27Jun 25, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Machine Learning for Authorship Identification using Gutenberg Data☆16Mar 6, 2017Updated 9 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Evaluation of source authorship attribution tool☆23Jun 5, 2021Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Sophos-ReversingLabs 20 million sample dataset☆699Apr 7, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆26Nov 22, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆21Mar 25, 2024Updated 2 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago