A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter
☆16Dec 9, 2019Updated 6 years ago
Alternatives and similar repositories for IoCMiner
Users that are interested in IoCMiner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "A Simple but Effective Approach to Improve Structured Language Model Output for Information Extraction"☆15Mar 15, 2024Updated 2 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Index of Macchina boards for the Arduino IDE Board Manager.☆10May 8, 2019Updated 6 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆13Jan 10, 2026Updated 2 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- 🛠 Live JavaScript RegExp tester☆12Mar 3, 2025Updated last year
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- ☆10Jan 22, 2025Updated last year
- Trusted Computing Architecture for Low-end Embedded Systems☆20Oct 22, 2024Updated last year
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 8 months ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆17Dec 10, 2014Updated 11 years ago
- ☆35Jan 13, 2026Updated 2 months ago
- 010 Editor Keygen☆16May 14, 2018Updated 7 years ago
- Hierarchical Story Generation based on (https://arxiv.org/abs/1805.04833)☆13May 6, 2020Updated 5 years ago
- Module to convert Cuckoo .json to .mist☆10Apr 8, 2020Updated 5 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- [COLING 2022]: CommunityLM: Probing Partisan Worldviews from Language Models☆15Jan 31, 2023Updated 3 years ago
- ☆18May 31, 2022Updated 3 years ago
- Sketch to scan OBDII with an M2☆13Aug 1, 2021Updated 4 years ago
- Hugo theme for documenting One-Day-Only projects☆11Jun 20, 2021Updated 4 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- The TextWorld KG Dataset from the paper Building Dynamic Knowledge Graphs from Text-based Games☆10Mar 11, 2020Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Codebase for the paper "Schema-guided User Satisfaction Modeling for Task-oriented Dialogues"☆11Aug 6, 2025Updated 7 months ago
- Capsule Routing for Named Entity Recognition☆10Dec 22, 2020Updated 5 years ago
- Experimental DUML client written in java. Licensed under GPLv3☆14Jan 7, 2018Updated 8 years ago
- An initial foray into deploying an exported RNBO Max MSP object as an Android app.☆14Jan 25, 2023Updated 3 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 8 years ago