Security-Scenes-Feature-Engineering-Toolkit, Continuous Integration.一款安全数据特征化工具
☆60May 22, 2023Updated 2 years ago
Alternatives and similar repositories for FXY
Users that are interested in FXY are comparing it to the libraries listed below
Sorting:
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- 等级保护测评windows工具源码☆69May 4, 2019Updated 6 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- httpscan 用于C段http资产快速扫描,目前只支持80端口。(多线程)☆10Jan 20, 2022Updated 4 years ago
- windows 加固脚本☆20Jun 9, 2020Updated 5 years ago
- Analysis Financial Attacker Groups, 金融行业攻击者团伙研究☆23Jun 24, 2021Updated 4 years ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- echoes(回响)是一款Github,红队监测工 具☆14Mar 31, 2022Updated 3 years ago
- 记录我的安全学术学习☆129Dec 15, 2020Updated 5 years ago
- 超硬核!使用图数据技术发现软件漏洞☆186Sep 1, 2021Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- smb爆破工具☆19May 7, 2021Updated 4 years ago
- 🔎 crx-scouter.js can detect which Chrome extensions we are using quietly.☆147Oct 6, 2023Updated 2 years ago
- 安全编排与自动化响应平台☆62Dec 16, 2020Updated 5 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 3 years ago
- CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送☆174May 22, 2023Updated 2 years ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 6 years ago
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆305Nov 30, 2024Updated last year
- ThinkCMF 框架上的任意内容包含漏洞☆36Oct 28, 2019Updated 6 years ago
- 总结了一下2019年在JVM环境中使用XXE攻击的知识☆58Oct 31, 2019Updated 6 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- ☆57Dec 15, 2020Updated 5 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- golang 版本的 nc ,支持平时使用的大部分功能,并增加了流量rc4加密☆38Nov 18, 2020Updated 5 years ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- A system that may trick hackers. 针对黑客的拟态欺骗系统。☆454Nov 20, 2025Updated 3 months ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆463Jan 15, 2026Updated last month
- java内存对象搜索辅助工具☆823Sep 23, 2022Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆163Sep 28, 2021Updated 4 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- guest→system(UAC手动提权)☆73Mar 18, 2020Updated 5 years ago
- NOPEN Tool 又名“morerats” 莫雷斯特,是方程式工具包里的工具。☆45Mar 18, 2022Updated 3 years ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- 安全场景、基于AI的安全算法和安全数据分析业界实践☆1,750Jul 28, 2021Updated 4 years ago