ANG13T / url_genieLinks
Malicious URL Detection Model NN optimized by Genetic Algorithms π§¬
β32Updated last year
Alternatives and similar repositories for url_genie
Users that are interested in url_genie are comparing it to the libraries listed below
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ41Updated last month
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance πΈβ51Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β124Updated last year
- Free training course offered at Hack Space Con 2023β138Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β52Updated 6 months ago
- IOCs and notes related to malwareβ22Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matchesβ47Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ124Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β141Updated 4 months ago
- Graphical map of known Advanced Persistent Threatsβ54Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β39Updated last year
- β136Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β54Updated 8 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reportsβ121Updated this week
- β40Updated 6 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β102Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Updated 9 months ago
- Living Off Security Toolsβ45Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β63Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europeβ34Updated last year
- β37Updated last year
- Orbital - A Custom CTF Platformβ44Updated last week
- ELFEN: Automated Linux Malware Analysis Sandboxβ126Updated 11 months ago
- Tor onion address lookupβ40Updated 4 months ago
- A powershell module for hiding payloads in the pixels of imagesβ61Updated 11 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ33Updated 2 months ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packtβ20Updated 5 months ago
- Track C2 servers, tools, and botnets over time by framework and locationβ40Updated 4 months ago
- A simple pentest container equipped with common python pentest tools.β41Updated 4 months ago
- Capture screenshots of onion services on an onion service.β49Updated last year