Paper and Links to Crimeware in the Modern Era
☆31Sep 5, 2019Updated 6 years ago
Alternatives and similar repositories for Crimeware-In-The-Modern-Era
Users that are interested in Crimeware-In-The-Modern-Era are comparing it to the libraries listed below
Sorting:
- ☆16Jan 18, 2020Updated 6 years ago
- ☆537Feb 26, 2026Updated last week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- Bit9 Platform☆20Jun 23, 2017Updated 8 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- A PHP script to run on your server to grab cookies through xss☆23Mar 25, 2019Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 9 months ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- Splunk Boss of the SOC v1 data set.☆113Jun 13, 2018Updated 7 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Sep 16, 2025Updated 5 months ago
- ☆32Feb 3, 2026Updated last month
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Dec 22, 2023Updated 2 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago