IQTLabs / atlasLinks
☆18Updated 2 years ago
Alternatives and similar repositories for atlas
Users that are interested in atlas are comparing it to the libraries listed below
Sorting:
- Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARD…☆17Updated 5 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Network Tools☆32Updated last year
- Open YARA scan- and search engine☆24Updated 4 months ago
- dns logger for passive dns collection☆42Updated 13 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆20Updated 5 years ago
- ☆14Updated 7 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Exploring various defensive response options for effectively securing a 5G core-network☆41Updated last year
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago
- ☆26Updated 2 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- ☆13Updated 7 years ago
- Use CDNJS as a source to build hashes of known JS/CSS/IMG/... content used all over the internet☆14Updated 2 months ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆13Updated 3 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Artificial Intelligence for mass political profiling and covert election interference.☆20Updated last year
- intrusion detection☆24Updated 8 years ago
- The system is broken face recognition for adversarial example testing.☆19Updated 3 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year