Make datasets like FFRI Dataset
☆13Jul 23, 2024Updated last year
Alternatives and similar repositories for ffridataset-scripts
Users that are interested in ffridataset-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆28Nov 20, 2024Updated last year
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 9 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- disarmBot is a bot that uses the AG2 framework to automatically create multiple LLM Agents, discuss about disinformation, and respond to …☆20Nov 25, 2025Updated 3 months ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- DDIR: An Open Source Dataset for Darkweb Research☆15Oct 28, 2019Updated 6 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Tools once available from McAfee but are no longer☆13May 9, 2024Updated last year
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- MCP Server for Cutter☆21Aug 2, 2025Updated 7 months ago
- ☆10Jul 8, 2020Updated 5 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- ☆15Feb 12, 2019Updated 7 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Mar 12, 2026Updated last week
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- Totsugekitai DeBugger☆21May 19, 2024Updated last year
- 卒業論文・修士論文および英語論文のための自己チェックリスト☆12Nov 28, 2023Updated 2 years ago
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆37Jul 14, 2025Updated 8 months ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,138Nov 22, 2024Updated last year
- ☆53Jun 13, 2019Updated 6 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- A fuzzer for the CAN bus☆18Mar 1, 2025Updated last year
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago