CyberThreatIntelligenceENTEL / malware-IoCView external linksLinks
☆14Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for malware-IoC
Users that are interested in malware-IoC are comparing it to the libraries listed below
Sorting:
- Extended Static Analysis Tool for Analyzing Android APK Files.☆14Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- Basically pipes.sh but rewritten in Python☆13Nov 16, 2025Updated 2 months ago
- Repository for archiving Cobalt Strike configuration☆36Feb 5, 2026Updated last week
- ☆34Nov 11, 2025Updated 3 months ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A Python interface to the Earthworm Seismic Data System.☆13Oct 4, 2024Updated last year
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- Template for living data workflow☆13Jan 30, 2019Updated 7 years ago
- Postador Automático de Imagens no Facebook.☆10Feb 13, 2021Updated 5 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆11Feb 5, 2024Updated 2 years ago
- repo do Diego☆10Nov 7, 2023Updated 2 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago
- Repositório da Disciplina de Geoprocessamento - UFRPE☆13Mar 2, 2020Updated 5 years ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- Please, see README.md for further information.☆12May 16, 2025Updated 8 months ago
- NVIDIA Compute Unified Device Architecture Toolkit☆15Feb 2, 2026Updated last week
- My configurations (dotfiles) and Fedora Workstation setup with ansible☆10Aug 16, 2021Updated 4 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Collection of generative art made by me.☆10Jul 8, 2018Updated 7 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 6 months ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- All Brazilian streets visualized by gender of street name.☆11Oct 1, 2020Updated 5 years ago
- Ransomware groups posts☆44Updated this week
- ☆11Jul 17, 2022Updated 3 years ago
- DGX RHEL SELinux Policies☆16Apr 12, 2024Updated last year
- Extrair a lista de usuários do Active Directory e envia por E-mail.☆13Jun 29, 2022Updated 3 years ago
- Template for the learning journey "Developing with SAP Integration Suite".☆22Jan 12, 2026Updated last month
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- The SAP's extension to OpenAPI Specification defines a standard for describing HTTP APIs at SAP.☆13Jan 22, 2026Updated 3 weeks ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- A tool to view the total transactions, received, sent, and current balance of Bitcoin wallets 👁☆17Aug 19, 2025Updated 5 months ago
- Generate livecoding drum patterns with magenta.js☆13Dec 9, 2022Updated 3 years ago