perdisci / amico
AMICO - Accurate Behavior-Based Detection of Malware Downloads
☆31Updated 7 years ago
Alternatives and similar repositories for amico:
Users that are interested in amico are comparing it to the libraries listed below
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 2 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- DNSDB query scripts☆75Updated 5 years ago
- ☆12Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- a collection of public yara rules☆26Updated 5 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆174Updated 9 years ago
- Automated IOC-Generation scripts and tools☆24Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Gather and compile open source threat intelligence feeds.☆39Updated 3 years ago
- integrating bro into yara☆33Updated 10 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- A Python library for parsing, manipulating, and generating CybOX content.☆78Updated 4 years ago
- Workbench: A scalable python framework for security research and development teams.☆91Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- MISP Workbench☆28Updated 8 years ago
- ☆75Updated 3 years ago
- ☆21Updated 9 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- A library for adversarial classifier evasion☆40Updated 10 years ago