InQuest / microsoft-office-macro-clusteringView external linksLinks
☆21Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for microsoft-office-macro-clustering
Users that are interested in microsoft-office-macro-clustering are comparing it to the libraries listed below
Sorting:
- ☆11Jun 15, 2022Updated 3 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- ☆22Feb 2, 2026Updated last week
- Packing detection tool for PE files☆27Dec 1, 2024Updated last year
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆38Jun 28, 2024Updated last year
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- Deprecated - This project repo is no longer being maintained.☆14Mar 15, 2023Updated 2 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- ☆12Feb 16, 2017Updated 8 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- A Kubernetes pod monitor for safely terminating pods with persistent volumes in case of node failures☆12Feb 2, 2026Updated last week
- Competitive Coding Project☆40Oct 1, 2020Updated 5 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Documentation website source code for Concord☆15Jan 28, 2026Updated 2 weeks ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- A Python library and command-line utility that filters comments from a source file☆10Sep 8, 2025Updated 5 months ago
- Secure State team and its customers can contribute with remediation rules and build a community around it☆14Apr 11, 2024Updated last year
- Cisco ASA Go SDK☆10Oct 8, 2021Updated 4 years ago
- The Fabulous Laboratory☆15Updated this week
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- Tinkerbell User Documentation Website☆14Mar 12, 2024Updated last year
- Cloud Custodian Community Content☆10Jan 25, 2023Updated 3 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- A minimalistic way to run WAVSEP☆16May 14, 2018Updated 7 years ago