LiuYuancheng / Python_Malwares_RepoLinks
We want to create a Repo which can provide different Malwares wrote by Python.
☆24Updated 3 months ago
Alternatives and similar repositories for Python_Malwares_Repo
Users that are interested in Python_Malwares_Repo are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆72Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆54Updated 4 months ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆13Updated 3 months ago
- ☆14Updated 2 weeks ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Updated 10 months ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆48Updated 2 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆62Updated 3 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- ☆12Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- ☆31Updated 2 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆60Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 6 months ago
- Jupyter Notebooks for the Blue Team☆36Updated 7 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆48Updated 3 weeks ago
- ☆113Updated 3 months ago
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 10 months ago
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Updated 6 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 4 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆134Updated this week
- Operational Technology Cyber Attack Database☆50Updated 3 years ago
- Turn any blog into structured threat intelligence.☆36Updated this week
- 12 Weeks, 24 Lessons, IoT for All!☆22Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- If you are interested in a live feed API, please contact us☆16Updated 4 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆29Updated 8 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- IOCs and notes related to malware☆25Updated last month