sophos / SOREL-20M
Sophos-ReversingLabs 20 million sample dataset
☆624Updated 3 years ago
Related projects: ⓘ
- Elastic Malware Benchmark for Empowering Researchers☆930Updated last month
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆519Updated this week
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆295Updated last year
- AVClass malware labeling tool☆458Updated 2 weeks ago
- ReversingLabs YARA Rules☆744Updated last week
- Indicators from Unit 42 Public Reports☆696Updated last week
- Cuckoo 3 is a Python 3 open source automated malware analysis system.☆604Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,602Updated last week
- Repository of YARA rules made by Trellix ATR Team☆560Updated 9 months ago
- yarGen is a generator for YARA rules☆1,533Updated 3 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆881Updated 5 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,032Updated last week
- MBC content in markdown☆359Updated this week
- ☆141Updated last year
- ☆560Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆224Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆697Updated last year
- IOC from articles, tweets for archives☆310Updated 9 months ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆881Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆743Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆490Updated 3 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆605Updated 2 years ago
- Malware Configuration And Payload Extraction☆1,893Updated this week
- Create adversarial attacks against machine learning Windows malware detectors☆202Updated 2 months ago
- Security ML models encoded as Yara rules☆207Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆513Updated 2 weeks ago
- ☆1,048Updated 5 years ago
- Re-play Security Events☆1,584Updated 6 months ago
- Distributed malware processing framework based on Python, Redis and S3.☆381Updated last week
- The Python interface for YARA☆648Updated 3 months ago