Azul is a malware repository for reverse engineers, incident responders and everyone in-between.
☆88Jan 19, 2026Updated last month
Alternatives and similar repositories for azul
Users that are interested in azul are comparing it to the libraries listed below
Sorting:
- ☆16Jun 27, 2025Updated 8 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆51Sep 22, 2025Updated 5 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated this week
- ThemeClipper - Generate theme clips from movies and series for jellyfin☆23Aug 31, 2025Updated 6 months ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- ☆12Jan 5, 2021Updated 5 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 2 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Lightweight Agent Detection & Response (ADR) layer for AI agents — guards commands, files, and web requests☆59Updated this week
- ☆12Sep 8, 2025Updated 5 months ago
- A personal content aggregator that filters multiple news sources for quality and relevance into a single, high-signal feed.☆28Jan 26, 2026Updated last month
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- ☆47Jan 8, 2026Updated last month
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- ☆30Jun 2, 2025Updated 8 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- A metadata enrichment API for music servers, backed by SQLite databases containing 256 million tracks.☆52Jan 7, 2026Updated last month
- How I document my homelab☆13May 13, 2025Updated 9 months ago
- PowerShell extension for Zed☆18Jul 16, 2025Updated 7 months ago
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 6 months ago
- Ensures that your qBittorrent container is always listening on the current Glutun forward port☆15Feb 15, 2026Updated last week
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Built quantitative models to measure value at risk (VaR) and Expected Shortfall (ES).☆13Aug 30, 2018Updated 7 years ago
- Turn a link or text into a attention grabbing video with speed reading.☆13Nov 9, 2025Updated 3 months ago
- Quantitative Risk Management Concepts☆12Sep 27, 2016Updated 9 years ago
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- ☆16Feb 19, 2023Updated 3 years ago