perdisci / amico
AMICO - Accurate Behavior-Based Detection of Malware Downloads
☆31Updated 7 years ago
Alternatives and similar repositories for amico:
Users that are interested in amico are comparing it to the libraries listed below
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Workbench: A scalable python framework for security research and development teams.☆91Updated 5 years ago
- a collection of public yara rules☆26Updated 5 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 2 years ago
- ☆12Updated 7 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- threat language parser☆60Updated 9 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- A system to record malware using PANDA☆43Updated 5 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Automated IOC-Generation scripts and tools☆24Updated 8 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆28Updated 3 years ago
- A library for adversarial classifier evasion☆40Updated 10 years ago
- ☆75Updated 8 years ago
- ☆28Updated 7 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 8 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago