rbortolameotti / decanter
☆16Updated 6 years ago
Alternatives and similar repositories for decanter:
Users that are interested in decanter are comparing it to the libraries listed below
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆13Updated 2 years ago
- A system to record malware using PANDA☆42Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- PDF Malware Parser☆20Updated 8 years ago
- Automated Yara Rule generation using Biclustering☆62Updated 3 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆53Updated 8 years ago
- ☆11Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆14Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆37Updated 8 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆109Updated 2 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- ☆77Updated 5 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Updated 5 years ago