LiuYuancheng / Python_Malwares_RepoLinks
We want to create a Repo which can provide different Malwares wrote by Python.
☆26Updated 6 months ago
Alternatives and similar repositories for Python_Malwares_Repo
Users that are interested in Python_Malwares_Repo are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆81Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆56Updated 7 months ago
- ☆14Updated 2 weeks ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆50Updated last week
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆14Updated 6 months ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Updated last year
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆67Updated 6 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 9 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13Updated 6 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆102Updated last year
- Turn any blog into structured threat intelligence.☆40Updated this week
- IOCs collected during day-to-day activities☆82Updated this week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆40Updated last year
- Security Operation Center Lab☆21Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆140Updated last week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 2 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆182Updated this week
- XposedOrNot: Open-source API for real-time alerts on domain data breaches. Protects your online identity with user-friendly monitoring an…☆69Updated this week
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week
- Darkelf Browser—available in PyQt5, PySide6, and Cocoa variants—is a custom, privacy-first browser. Built on Qt/PyQt5 and Qt/PySide6 (wit…☆24Updated last month
- Operational Technology Cyber Attack Database☆51Updated 3 years ago
- ☆116Updated 6 months ago
- A curated repository of incident response playbooks☆109Updated 2 years ago
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Updated last month
- ☆52Updated 3 months ago
- Graphical map of known Advanced Persistent Threats☆58Updated 8 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆128Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago