hija / MalwareDataScience
Malware Data Science Reading Diary / Notes
☆120Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for MalwareDataScience
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆111Updated last year
- Security ML models encoded as Yara rules☆211Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- Set of tools for interacting with Malshare☆154Updated 4 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆150Updated 5 years ago
- ☆143Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆81Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 months ago
- Malware Analyst's Cookbook stuffs☆153Updated 9 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆131Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆81Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- snake - a malware storage zoo☆217Updated last year
- Tools to interact with APTnotes reporting/index.☆97Updated 4 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆40Updated 9 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- Automatic Yara Rule Generation☆332Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆135Updated 4 years ago
- Parse YARA rules and operate over them more easily.☆174Updated 5 months ago
- ☆96Updated 4 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆142Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆60Updated 11 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆132Updated 4 years ago
- ☆123Updated 3 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago