This tool maps a file's behavior on MITRE ATT&CK matrix.
☆60Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for Hachi
Users that are interested in Hachi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- forum thread here https://aryion.com/forum/viewtopic.php?f=79&t=43948☆10Jan 16, 2020Updated 6 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆34Apr 2, 2024Updated last year
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- NextB的基于敏感哈希的恶意文件相似度比 较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Aug 31, 2024Updated last year
- 使用Qwen1.5-0.5B-Chat模型进行通用信息抽取任务的微调,旨在: 验证生成式方法相较于抽取式NER的效果; 为新手提供简易的模型微调流程,尽量减少代码量; 大模型训练的数据格式处理。☆15Sep 6, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- BitRat Source Code☆42Oct 23, 2020Updated 5 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Nov 2, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- ☆16Jul 17, 2021Updated 4 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- TypeDB Driver for Node.js☆31Sep 27, 2023Updated 2 years ago
- OpenAEV Docker deployment helpers☆28Mar 19, 2026Updated last week
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆41Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- A finder of domain typos showing country of IP address☆166Nov 15, 2023Updated 2 years ago
- an asynchronous target enumeration tool☆247Dec 8, 2022Updated 3 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 5 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago