This tool maps a file's behavior on MITRE ATT&CK matrix.
☆60Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for Hachi
Users that are interested in Hachi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Jul 28, 2020Updated 5 years ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- make virus without coding☆12Apr 7, 2020Updated 6 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- OpenCTI Add-On for Splunk☆14Jan 13, 2026Updated 3 months ago
- ☆14May 23, 2023Updated 2 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- ☆12Nov 4, 2019Updated 6 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆14Jan 20, 2022Updated 4 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆25Nov 7, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- Source to ResonateII, don't do anything dumb. READ THE README BELOW☆12Feb 27, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 8 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- A python based Bot Net Framework☆43Aug 14, 2025Updated 8 months ago
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- ☆17Jul 17, 2021Updated 4 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- TypeDB Driver for Node.js☆31Sep 27, 2023Updated 2 years ago
- OpenAEV Docker deployment helpers☆29Updated this week
- Automated threat intel feed parsing and consolidation💻👾🤖☆41Updated this week
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆36Apr 3, 2023Updated 3 years ago