Code for Benchmarking two ML Approaches performing Authorship Attribution
☆43Apr 5, 2022Updated 3 years ago
Alternatives and similar repositories for APTAttribution
Users that are interested in APTAttribution are comparing it to the libraries listed below
Sorting:
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆361Nov 10, 2022Updated 3 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆23Mar 17, 2024Updated last year
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- ☆19Mar 31, 2019Updated 6 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- ☆98Oct 7, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆20Mar 25, 2024Updated last year
- ☆14May 23, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆961Updated this week
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- ☆23Aug 1, 2020Updated 5 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- ☆19Mar 31, 2022Updated 3 years ago