edouardklein / JsItBad
Machine Learning for malicious Javascript code detection
☆19Updated 8 years ago
Alternatives and similar repositories for JsItBad:
Users that are interested in JsItBad are comparing it to the libraries listed below
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆83Updated 2 years ago
- ☆14Updated 6 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Updated 8 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- a collection of public yara rules☆26Updated 5 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 8 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆35Updated 7 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- ☆27Updated 8 years ago
- ☆52Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Fuzzy Hash calculated from import API of PE files☆87Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆24Updated 6 years ago
- ☆68Updated 7 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Static extraction of dridex malware configuration☆19Updated 9 years ago
- Tools☆13Updated last year
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago