konstantinberlin / malware-windows-audit-log-detection
Detection of malware using dynamic behavior and Windows audit logs
☆79Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for malware-windows-audit-log-detection
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- ☆93Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Sweet, sweet, secrepo.com html.☆132Updated 3 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 4 years ago
- malware-traffic-analysis.net PCAPs repository.☆34Updated 8 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆29Updated last year
- A Python library and command line tools to provide interactive log visualization.☆137Updated last year
- A series of labs that will help users apply various data science techniques to security related data.☆131Updated 9 years ago
- A system to record malware using PANDA☆42Updated 5 years ago
- Malware/IOC ingestion and processing engine☆103Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- STIX Visualization Tool☆107Updated 6 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- Python bindings for ssdeep☆91Updated 2 years ago
- ☆76Updated 2 years ago
- Generate STIX XML from OpenIOC XML☆89Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆85Updated 7 years ago
- Malware static analysis framework☆174Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Automated malware unpacker☆118Updated 8 years ago
- A warehouse for your malware☆133Updated 11 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- ☆49Updated 9 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 7 years ago
- ☆37Updated 10 years ago