dtrizna / SysmonRNN
All necessary code in order to feed Sysmon data into Recurrent Neural Network
☆17Updated 4 years ago
Alternatives and similar repositories for SysmonRNN:
Users that are interested in SysmonRNN are comparing it to the libraries listed below
- Links to malware-related YARA rules☆14Updated 2 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 9 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- Surface Analysis System on Cloud☆19Updated last year
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated last year
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- Symantec EDR Internals☆26Updated 3 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago
- Userland API monitor for threat hunting☆57Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 2 weeks ago
- ☆34Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Generate YARA rules for OOXML documents.☆38Updated last year
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- ☆16Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 3 months ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 5 months ago
- Collection of YARA signatures from individual research☆42Updated last year
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- ☆39Updated 2 years ago
- ☆33Updated 2 years ago
- ☆22Updated last year