This is a malware analysis project which expecte to generate snort rule via malicious network traffic
☆28Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Snort IDS ported to OpenNetVM☆17Apr 17, 2020Updated 5 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 2 years ago
- Open-source advanced cracking tool made in Electron.JS☆19Jul 7, 2020Updated 5 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 4 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 9 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Tools for VirusTotal☆36Nov 29, 2012Updated 13 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- xss payloads generator☆25Mar 1, 2019Updated 6 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- AWVS12&AWVS13 通用API批量导入脚本 AWVS12 & AWVS13 common API batch import script.☆25Mar 3, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- ThinkCMF 框架上的任意内容包含漏洞☆36Oct 28, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago