Indicators of Compromise (IOCs) for malware we have researched
☆11Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Builds a data science work environment for Russell Jurney's book Agile Data Science.☆46Jul 31, 2014Updated 11 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Rabbitmq Cluster using Docker☆14Feb 1, 2017Updated 9 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Use Kibana to visualize temperature data coming from the dht22 sensor connected to an esp8266 indexing to elastic search☆14Jul 15, 2017Updated 8 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- A fork of Gordon Henderson's git://git.drogon.net/wiringPi but with python bindings☆11Jan 2, 2017Updated 9 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- Domain Top Level Checker☆11Jan 3, 2016Updated 10 years ago
- Universal DLL injecting loader based on Detours☆14Jul 18, 2021Updated 4 years ago
- example Managed Component for inspiration & testing☆15Jul 25, 2025Updated 7 months ago
- ☆12Sep 12, 2020Updated 5 years ago
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- blkinfo is a python package to list information about all available or the specified block devices.☆11Aug 6, 2023Updated 2 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- The pseudo-OS I'm working on on my livestreams☆12Jul 8, 2017Updated 8 years ago
- an easy to use and lightweight signal-safe logging library☆29Jan 10, 2026Updated 2 months ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆13Jun 4, 2024Updated last year
- Node add-on to access security features on Windows☆16Oct 10, 2018Updated 7 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆10Jul 11, 2019Updated 6 years ago
- Simple bot for Texas Hold'em. Uses a montecarlo approach and it's extensible.☆12Mar 27, 2015Updated 10 years ago
- A library to automate the conversion of linux-based VMs to a set of docker containers☆14Apr 10, 2015Updated 10 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- Small scripts for quickly plotting and munging data from the command line.☆38Jan 2, 2024Updated 2 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- ☆14Jan 26, 2015Updated 11 years ago
- WordOps documentation built with Mkdocs☆13Jan 10, 2025Updated last year
- Snapshot of the vectorized MMU that lines up with the vectorized MMU blog☆23Apr 10, 2020Updated 5 years ago
- to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.☆11Aug 1, 2019Updated 6 years ago
- Monte Carlo simulation of Pi☆14May 21, 2018Updated 7 years ago
- An example showing how to use multiple event loops in libuv. The loops run in two different threads, and the example also shows how threa…☆22Dec 7, 2012Updated 13 years ago