cyber-research / APTAttributionLinks
Code for Benchmarking two ML Approaches performing Authorship Attribution
☆39Updated 3 years ago
Alternatives and similar repositories for APTAttribution
Users that are interested in APTAttribution are comparing it to the libraries listed below
Sorting:
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- ☆25Updated 4 years ago
- Malware Classification using Machine learning☆72Updated 9 months ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆336Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆246Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆125Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆158Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆16Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- malicious PowerShell script detection model☆40Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- ☆79Updated 2 years ago
- ☆13Updated 7 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- ☆118Updated 5 years ago
- Automated Yara Rule generation using Biclustering☆70Updated 4 years ago
- ☆31Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆85Updated last year
- ☆37Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆28Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago