☆21Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for microsoft-office-macro-clustering
Users that are interested in microsoft-office-macro-clustering are comparing it to the libraries listed below
Sorting:
- ☆11Jun 15, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆16Mar 5, 2018Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Packing detection tool for PE files☆27Dec 1, 2024Updated last year
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 7 months ago
- ☆24Feb 2, 2026Updated last month
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆39Jun 28, 2024Updated last year
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- Deprecated - This project repo is no longer being maintained.☆14Mar 15, 2023Updated 2 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago
- Dataset of packed PE samples☆43Jan 24, 2026Updated last month
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Competitive Coding Project☆40Oct 1, 2020Updated 5 years ago
- A stable Java API for interfacing with and extending OpenNMS☆14Jan 27, 2026Updated last month
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Dec 1, 2024Updated last year
- Flask app for connecting Munki and MicroMDM☆13Jun 17, 2022Updated 3 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- New York Times Scraper☆11Feb 19, 2024Updated 2 years ago
- A Kubernetes pod monitor for safely terminating pods with persistent volumes in case of node failures☆12Feb 23, 2026Updated last week
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago