This is a malware analysis project which expecte to generate snort rule via malicious network traffic
☆28Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Jan 1, 2015Updated 11 years ago
- ☆10May 10, 2018Updated 7 years ago
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- 基于python开发的主动漏洞扫描工具☆10Jul 11, 2022Updated 3 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- Evading Snort Intrusion Detection System.☆77Sep 18, 2021Updated 4 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Snort IDS ported to OpenNetVM☆17Apr 17, 2020Updated 5 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Tools for VirusTotal☆37Nov 29, 2012Updated 13 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Getting Started with Aether☆11Aug 3, 2023Updated 2 years ago
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration (CoNEXT '23)☆11Oct 26, 2023Updated 2 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- AWVS12&AWVS13 通用API批量导入脚本 AWVS12 & AWVS13 common API batch import script.☆25Mar 3, 2022Updated 4 years ago