Blevene / Crimeware-In-The-Modern-EraView external linksLinks
Paper and Links to Crimeware in the Modern Era
☆31Sep 5, 2019Updated 6 years ago
Alternatives and similar repositories for Crimeware-In-The-Modern-Era
Users that are interested in Crimeware-In-The-Modern-Era are comparing it to the libraries listed below
Sorting:
- ☆16Jan 18, 2020Updated 6 years ago
- ☆536Feb 3, 2026Updated last week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- Misc Tools for Virus Total Interaction☆34Mar 2, 2018Updated 7 years ago
- Bit9 Platform☆20Jun 23, 2017Updated 8 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Oct 13, 2022Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆79Sep 4, 2024Updated last year
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- A PHP script to run on your server to grab cookies through xss☆23Mar 25, 2019Updated 6 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Oct 30, 2025Updated 3 months ago
- ☆54Sep 6, 2020Updated 5 years ago
- Awesome VirusTotal Intelligence Search Queries☆331May 16, 2023Updated 2 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- module for osquery to load Bro logs into tables☆28Apr 28, 2015Updated 10 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Sep 16, 2025Updated 4 months ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- ☆31Feb 3, 2026Updated last week
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago