mohamedbenchikh / MDML
Malware Detection using Machine Learning (MDML)
☆46Updated last year
Related projects: ⓘ
- Configuration Extractors for Malware☆51Updated 2 weeks ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆80Updated last year
- Python based CLI for MalwareBazaar☆36Updated 9 months ago
- ☆44Updated 2 weeks ago
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- ☆63Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆67Updated 2 years ago
- Lazarus analysis tools and research report☆54Updated 8 months ago
- Some of my Malware Analysis writeups.☆40Updated last year
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆30Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- Modular malware analysis artifact collection and correlation framework☆49Updated 4 months ago
- Hive v5 file decryption algorithm☆34Updated last year
- PowerShell Script Analyzer☆64Updated 10 months ago
- Quick analysis focusing on most important of a Malware or a Threat☆39Updated last year
- ☆26Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆125Updated 9 months ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- Just another collection of links, tools, reports and other stuff☆19Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Repository of Yara Rules☆83Updated last week
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- Malware vulnerability intel tool for third-party attackers.☆107Updated last year
- An Adaptive Misuse Detection System☆27Updated 2 weeks ago
- aggregated repo for all conferences and talks I am giving☆17Updated 2 years ago