Code for Benchmarking two ML Approaches performing Authorship Attribution
☆43Apr 5, 2022Updated 3 years ago
Alternatives and similar repositories for APTAttribution
Users that are interested in APTAttribution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆371Nov 10, 2022Updated 3 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Remote Administration Tool For Windows☆13Apr 27, 2018Updated 7 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- ☆49Mar 1, 2022Updated 4 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- ☆11Jun 13, 2020Updated 5 years ago
- Authorship Attribution of Tweets using Convolutional Neural Networks Over character n-grams☆11Aug 25, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆967Feb 28, 2026Updated 3 weeks ago
- ☆98Oct 7, 2020Updated 5 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Finding Gender/Age of Authors based on written text☆13Apr 21, 2019Updated 6 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- 17条检测cobaltstrike的suricata-ids规则☆69Jun 20, 2022Updated 3 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- ☆26Jun 25, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- Programmer De-anonymization from Binary Executables☆88Apr 11, 2018Updated 7 years ago
- Machine Learning for Authorship Identification using Gutenberg Data☆16Mar 6, 2017Updated 9 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- Evaluation of source authorship attribution tool☆23Jun 5, 2021Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Sophos-ReversingLabs 20 million sample dataset☆692Apr 7, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago