Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jpcadena/malware-analysis
Analysis of malware signatures and their associated Common Vulnerabilities and Exposures (CVEs)
https://github.com/jpcadena/malware-analysis
black common-vulnerabilities-and-exposures cve-search data-analysis data-engineering data-reporting data-visualization isort malware-analysis matplotlib mypy numpy pandas plotly poetry pre-commit pydantic python ruff seaborn
Last synced: 2 days ago
JSON representation
Analysis of malware signatures and their associated Common Vulnerabilities and Exposures (CVEs)
- Host: GitHub
- URL: https://github.com/jpcadena/malware-analysis
- Owner: jpcadena
- License: mit
- Created: 2024-01-26T01:27:45.000Z (10 months ago)
- Default Branch: master
- Last Pushed: 2024-11-11T17:26:14.000Z (6 days ago)
- Last Synced: 2024-11-11T18:25:21.111Z (6 days ago)
- Topics: black, common-vulnerabilities-and-exposures, cve-search, data-analysis, data-engineering, data-reporting, data-visualization, isort, malware-analysis, matplotlib, mypy, numpy, pandas, plotly, poetry, pre-commit, pydantic, python, ruff, seaborn
- Language: Python
- Homepage: https://github.com/jpcadena/malware-analysis
- Size: 3.42 MB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
Awesome Lists containing this project
README
# malware-analysis
Table of Contents
## About The Project
![Project][project-screenshot]
This project conducts a comprehensive analysis of malware signatures and their correlation with known CVEs, providing valuable insights through data visualization and statistical analysis. The goal is to aid cybersecurity efforts in identifying and understanding common vulnerabilities exploited by malware.
### Built with
[![Python][python-shield]][python-url] [![Pydantic][pydantic-shield]][pydantic-url] [![isort][isort-shield]][isort-url] [![Black][black-shield]][black-url] [![Ruff][ruff-shield]][ruff-url] [![MyPy][mypy-shield]][mypy-url] [![pre-commit][pre-commit-shield]][pre-commit-url] [![GitHub Actions][github-actions-shield]][github-actions-url] [![Poetry][poetry-shield]][poetry-url] [![Pycharm][pycharm-shield]][pycharm-url] [![Visual Studio Code][visual-studio-code-shield]][visual-studio-code-url] [![Markdown][markdown-shield]][markdown-url] [![License: MIT][license-shield]][license-url] [![Pandas][pandas-shield]][pandas-url] [![Numpy][numpy-shield]][numpy-url] [![Matplotlib][matplotlib-shield]][matplotlib-url] [![Adobe Acrobat Reader][adobe-acrobat-reader-shield]][adobe-url]
## Getting started
### Prerequisites
* [Python 3.11+][python-docs]
### Installation
1. Clone the **repository**
```bash
git clone https://github.com/jpcadena/malware-analysis.git
```2. Change the directory to **root project**
```bash
cd malware-analysis
```3. Install **Poetry** package manager
```bash
pip install poetry
```4. Install the project's **dependencies**
```bash
poetry install
```5. Activate the **environment**
```bash
poetry shell
```## Usage
1. Replace the real datasets in the data/raw directory as the ones uploaded
are small samples with 5 rows.
2. Execute with console
```bash
python main.py
```
3. For more information, check the report.pdf file and the small summary
with the insights required there is an analysis.txt file as required.## Contributing
[![GitHub][github-shield]][github-url]
Please read our [contributing guide](CONTRIBUTING.md) for details on our code of conduct, and the process for submitting pull requests to us.
## Security
For security considerations and best practices, please refer to our [Security Guide](SECURITY.md) for a detailed guide.
## Code of Conduct
We enforce a code of conduct for all maintainers and contributors. Please read our [Code of Conduct](CODE_OF_CONDUCT.md) to understand the expectations before making any contributions.
## License
Distributed under the MIT License. See [LICENSE](LICENSE) for more information.
## Contact
- [![LinkedIn][linkedin-shield]][linkedin-url]
- [![Outlook][outlook-shield]](mailto:[email protected]?subject=[GitHub]malware-analysis)
[project-screenshot]: assets/images/project.png
[python-docs]: https://docs.python.org/3.11/[linkedin-shield]: https://img.shields.io/badge/linkedin-%230077B5.svg?style=for-the-badge&logo=linkedin&logoColor=white
[outlook-shield]: https://img.shields.io/badge/Microsoft_Outlook-0078D4?style=for-the-badge&logo=microsoft-outlook&logoColor=white
[python-shield]: https://img.shields.io/badge/python-3670A0?style=for-the-badge&logo=python&logoColor=ffdd54
[pydantic-shield]: https://img.shields.io/badge/Pydantic-FF43A1?style=for-the-badge&logo=pydantic&logoColor=white
[pycharm-shield]: https://img.shields.io/badge/PyCharm-21D789?style=for-the-badge&logo=pycharm&logoColor=white
[markdown-shield]: https://img.shields.io/badge/Markdown-000000?style=for-the-badge&logo=markdown&logoColor=white
[github-shield]: https://img.shields.io/badge/github-%23121011.svg?style=for-the-badge&logo=github&logoColor=white
[ruff-shield]: https://img.shields.io/endpoint?url=https://raw.githubusercontent.com/charliermarsh/ruff/main/assets/badge/v1.json
[black-shield]: https://img.shields.io/badge/code%20style-black-000000.svg?style=for-the-badge&logo=appveyor
[mypy-shield]: https://img.shields.io/badge/mypy-checked-2A6DB2.svg?style=for-the-badge&logo=appveyor
[visual-studio-code-shield]: https://img.shields.io/badge/Visual_Studio_Code-007ACC?style=for-the-badge&logo=visual-studio-code&logoColor=white
[poetry-shield]: https://img.shields.io/endpoint?url=https://raw.githubusercontent.com/python-poetry/website/main/static/badge/v0.json
[isort-shield]: https://img.shields.io/badge/%20imports-isort-%231674b1?style=flat&labelColor=ef8336
[github-actions-shield]: https://img.shields.io/badge/github%20actions-%232671E5.svg?style=for-the-badge&logo=githubactions&logoColor=white
[pre-commit-shield]: https://img.shields.io/badge/pre--commit-F7B93E?style=for-the-badge&logo=pre-commit&logoColor=white
[license-shield]: https://img.shields.io/badge/License-MIT-yellow.svg
[pandas-shield]: https://img.shields.io/badge/pandas-%23150458.svg?style=for-the-badge&logo=pandas&logoColor=white
[numpy-shield]: https://img.shields.io/badge/numpy-%23013243.svg?style=for-the-badge&logo=numpy&logoColor=white
[matplotlib-shield]: https://img.shields.io/badge/Matplotlib-%23ffffff.svg?style=for-the-badge&logo=Matplotlib&logoColor=black
[adobe-acrobat-reader-shield]: https://img.shields.io/badge/Adobe%20Acrobat%20Reader-EC1C24.svg?style=for-the-badge&logo=Adobe%20Acrobat%20Reader&logoColor=white[linkedin-url]: https://linkedin.com/in/juanpablocadenaaguilar
[python-url]: https://docs.python.org/3.11/
[pydantic-url]: https://docs.pydantic.dev
[pycharm-url]: https://www.jetbrains.com/pycharm/
[markdown-url]: https://daringfireball.net/projects/markdown/
[github-url]: https://github.com/jpcadena/malware-analysis
[ruff-url]: https://beta.ruff.rs/docs/
[black-url]: https://github.com/psf/black
[mypy-url]: http://mypy-lang.org/
[visual-studio-code-url]: https://code.visualstudio.com/
[poetry-url]: https://python-poetry.org/
[isort-url]: https://pycqa.github.io/isort/
[github-actions-url]: https://github.com/features/actions
[pre-commit-url]: https://pre-commit.com/
[license-url]: https://opensource.org/licenses/MIT
[pandas-url]: https://pandas.pydata.org/docs/
[numpy-url]: https://numpy.org/
[matplotlib-url]: https://matplotlib.org/
[adobe-url]: https://get.adobe.com/reader/