LiuYuancheng / Python_Malwares_RepoLinks
We want to create a Repo which can provide different Malwares wrote by Python.
☆26Updated 4 months ago
Alternatives and similar repositories for Python_Malwares_Repo
Users that are interested in Python_Malwares_Repo are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆79Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆54Updated 5 months ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆13Updated 5 months ago
- ☆14Updated 2 months ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆47Updated this week
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Updated 11 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆64Updated 4 months ago
- Darkelf Browser—available in PyQt5, PySide6, and Cocoa variants—is a custom, privacy-first browser. Built on Qt/PyQt5 and Qt/PySide6 (wit…☆24Updated last week
- Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 7 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆119Updated last month
- ☆12Updated last year
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Updated 2 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Turn any blog into structured threat intelligence.☆38Updated last week
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Updated 7 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆31Updated 6 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆138Updated last week
- IOCs and notes related to malware☆25Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆36Updated 9 months ago
- ☆31Updated 2 years ago
- IOCs collected during day-to-day activities☆77Updated this week
- ☆116Updated 4 months ago
- A series of python scripts to extract information from Dark Web Applications☆13Updated 6 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆101Updated last year