seymour1 / label-virusshare
A project to label the VirusShare malware corpus using VirusTotal's public API.
☆30Updated last year
Alternatives and similar repositories for label-virusshare:
Users that are interested in label-virusshare are comparing it to the libraries listed below
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- Automated malware unpacker☆120Updated 8 years ago
- ☆77Updated 5 years ago
- Set of tools for interacting with Malshare☆153Updated 4 years ago
- ☆57Updated 3 years ago
- Parse YARA rules and operate over them more easily.☆179Updated this week
- A mapping of used malware names to commonly known family names☆62Updated last year
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- Automated Yara Rule generation using Biclustering☆62Updated 3 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- ☆50Updated 8 years ago
- My Yara Rules Collection☆52Updated 8 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 7 months ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Python bindings for ssdeep☆91Updated 2 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 3 years ago
- DGA Domains detection☆62Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆109Updated 2 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- Compilation of peHash implementations.☆14Updated 5 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆82Updated last year
- Fuzzy Hash calculated from import API of PE files☆87Updated 2 years ago
- Yet Another YARA rule Generator☆62Updated 6 years ago