Repository to provide files related to our blog articles.
☆16May 26, 2025Updated 9 months ago
Alternatives and similar repositories for Blog_CyTec
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
Sorting:
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- A Python implementation of the Community ID flow hashing standard☆23Nov 29, 2023Updated 2 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- provides a Suricata Eve output for Kafka with Suricate Eve plugin☆15Nov 25, 2021Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆22Apr 17, 2025Updated 11 months ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Full packet capture with flow cutoff, rotation, and compression☆15Sep 18, 2018Updated 7 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- Assignments of CS100.1x, Introduction to Big Data with Apache Spark☆18Jun 29, 2015Updated 10 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- A simple asset management application based on Scalar DL☆10May 11, 2023Updated 2 years ago
- Real Time Streaming using Apache Spark Streaming [Video], published by Packt☆10Oct 31, 2022Updated 3 years ago
- Plugx 开源情报集合☆23Dec 10, 2024Updated last year
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- CLI and Go package for fast, offline ASN lookups☆21Feb 27, 2025Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- ☆11Jun 11, 2025Updated 9 months ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- A tool to test cross-device authentication protocol security☆27Feb 24, 2025Updated last year
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated 2 months ago
- Validate if afpacket PACKET_FANOUT_HASH is working properly☆25May 19, 2022Updated 3 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- 基于 PyQt5 的 Nuclei 漏洞扫描图形化工具,支持 POC 管理、FOFA/Hunter/Shodan 资产搜索、AI 辅助分析、漏洞报告生成等功能☆38Feb 28, 2026Updated 2 weeks ago
- Mobile Application Security Design Guide☆18Oct 6, 2025Updated 5 months ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Aug 1, 2022Updated 3 years ago
- Privacy Check Go☆26Feb 11, 2026Updated last month
- Top-K elephant flows finding using HeavyKeeper accurate algorithm☆31Jan 18, 2023Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago