Code for Benchmarking two ML Approaches performing Authorship Attribution
☆41Apr 5, 2022Updated 4 years ago
Alternatives and similar repositories for APTAttribution
Users that are interested in APTAttribution are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 17, 2021Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- ☆12Jan 2, 2018Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Remote Administration Tool For Windows☆13Apr 27, 2018Updated 7 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- ☆49Mar 1, 2022Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆969Feb 28, 2026Updated last month
- ☆98Oct 7, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 10 months ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- 17条检测cobaltstrike的suricata-ids规则☆68Jun 20, 2022Updated 3 years ago
- Frontend for MalShare.com☆17Apr 7, 2026Updated last week
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- Programmer De-anonymization from Binary Executables☆88Apr 11, 2018Updated 8 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆24Sep 28, 2022Updated 3 years ago
- Sophos-ReversingLabs 20 million sample dataset☆695Apr 7, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆25Nov 22, 2021Updated 4 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆20Mar 25, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆108Oct 30, 2019Updated 6 years ago
- ☆19Mar 31, 2022Updated 4 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 11 months ago
- shared samples from #dailyphish and/or #apt tweets☆42Sep 3, 2025Updated 7 months ago