This is a malware analysis project which expecte to generate snort rule via malicious network traffic
☆28Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 9 years ago
- ☆10May 10, 2018Updated 7 years ago
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- Evading Snort Intrusion Detection System.☆77Sep 18, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Feb 17, 2015Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Tools for VirusTotal☆37Nov 29, 2012Updated 13 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Getting Started with Aether☆11Aug 3, 2023Updated 2 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration (CoNEXT '23)☆11Oct 26, 2023Updated 2 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Dec 28, 2015Updated 10 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- An OpenFlow application for resilient multicast☆12Mar 30, 2017Updated 9 years ago