fabriciojoc / malware-machinelearningLinks
Malware - Machine Learning
☆11Updated 7 years ago
Alternatives and similar repositories for malware-machinelearning
Users that are interested in malware-machinelearning are comparing it to the libraries listed below
Sorting:
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Machine Learning applied to Cyber Security Course☆44Updated 5 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- ☆20Updated last year
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Updated 6 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago
- A Single Library Parser to extract meta information,static analysis and detect macros within the files.☆1Updated 6 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- ☆43Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆35Updated 7 years ago
- Malware Machine Learning☆27Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A malware dataset curation tool which helps identify packed samples.☆32Updated 6 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 10 months ago
- "Fuzzy matching" for SQLite databases☆30Updated 4 years ago
- ssdeep based clustering tool☆14Updated 9 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Updated 8 years ago
- Data package with attacks against civil society☆13Updated 9 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- Additional material for the malware variants identification paper☆9Updated 5 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year