YARA, SIGMA, SNORT Rules based on Malware Analysis
☆16Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for Detection_Engineering_Signatures
Users that are interested in Detection_Engineering_Signatures are comparing it to the libraries listed below
Sorting:
- Collected wallpapers from around the web.☆20Jul 4, 2020Updated 5 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Apr 26, 2024Updated last year
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆69Apr 1, 2025Updated 11 months ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- 一款记录任务时间的时间管理应用☆16Dec 29, 2025Updated 2 months ago
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆13Nov 27, 2023Updated 2 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆26Updated this week
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Global Security Database Tools☆43Dec 13, 2023Updated 2 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆12Nov 13, 2023Updated 2 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- ☆16May 13, 2021Updated 4 years ago
- You can find the full source codes of all my projects here.☆10Nov 26, 2023Updated 2 years ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- Kismet website generation & documentation data☆12Feb 7, 2026Updated 3 weeks ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- ☆11Updated this week
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Dec 8, 2021Updated 4 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- ⚛️ Pikaso React Hook☆11Jul 25, 2022Updated 3 years ago