d84-n1nj4 / malwareDataScienceLinks
☆10Updated 4 years ago
Alternatives and similar repositories for malwareDataScience
Users that are interested in malwareDataScience are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆45Updated 7 months ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆27Updated 9 months ago
- ☆15Updated 5 years ago
- ☆14Updated 7 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆33Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- Repository of Yara Rules☆111Updated last month
- Malicious PowerShell Dataset☆16Updated last year
- A yara based MCP Server☆13Updated this week
- Malware Analysis Exercise Samples and Resources☆41Updated last week
- Machine Learning Ransomware Detection☆33Updated 7 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- Some of my Malware Analysis writeups.☆46Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 2 years ago
- Configuration Extractors for Malware☆106Updated last month
- ☆28Updated 5 years ago
- yara detection rules for hunting with the threathunting-keywords project☆121Updated 3 weeks ago
- Augmentation to Machine Readable CTI☆31Updated last month
- Detection Engineering with YARA☆87Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- ☆11Updated 2 years ago
- An Adaptive Misuse Detection System☆40Updated 7 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 3 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆101Updated last year