Kart1keya / HachiView external linksLinks
This tool maps a file's behavior on MITRE ATT&CK matrix.
☆59Mar 4, 2020Updated 5 years ago
Alternatives and similar repositories for Hachi
Users that are interested in Hachi are comparing it to the libraries listed below
Sorting:
- David is a very funny man☆10Feb 19, 2021Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Intelligence-Led Cyber Attack Taxonomy, CAT☆11Aug 7, 2019Updated 6 years ago
- ☆12Nov 4, 2019Updated 6 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago
- A demo of asynchronous generation of static html pages using Django 3.0 + Celery 4.4 + Redis 3.3.☆15Jan 6, 2022Updated 4 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Mar 25, 2021Updated 4 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- ☆21May 13, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- ☆25May 9, 2021Updated 4 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Mar 12, 2020Updated 5 years ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆30Nov 7, 2024Updated last year
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- A lightweight CLI tool that finds system calls being called inside golang applications.☆31Oct 22, 2021Updated 4 years ago
- Automated Tactics Techniques & Procedures☆260May 26, 2023Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27May 10, 2019Updated 6 years ago
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- A python based Bot Net Framework☆43Aug 14, 2025Updated 5 months ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆39Updated this week