edouardklein / JsItBad
Machine Learning for malicious Javascript code detection
☆19Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for JsItBad
- ☆14Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A mapping of used malware names to commonly known family names☆61Updated last year
- Syntactic detection of malicious (obfuscated) JavaScript files☆73Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆32Updated last year
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆72Updated 5 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆24Updated 5 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆81Updated 3 years ago
- ☆57Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 2 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- ssdeep cluster analysis for malware files☆29Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆59Updated 6 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- This repository contains a list of pseudo-sorted malicious JavaScripts collected from time to time.☆80Updated last year
- Fuzzy Hash calculated from import API of PE files☆87Updated 2 years ago
- Maltese - Malware Traffic Emulator☆26Updated 7 years ago
- malware-traffic-analysis.net PCAPs repository.☆34Updated 8 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆60Updated 11 months ago
- ☆41Updated 6 years ago