LiuYuancheng / Python_Malwares_RepoLinks
We want to create a Repo which can provide different Malwares wrote by Python.
☆21Updated last week
Alternatives and similar repositories for Python_Malwares_Repo
Users that are interested in Python_Malwares_Repo are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- ☆13Updated this week
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆12Updated last month
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆56Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆52Updated last month
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Updated 7 months ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆40Updated 3 weeks ago
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Updated 3 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆54Updated last week
- Turn any blog into structured threat intelligence.☆32Updated this week
- 12 Weeks, 24 Lessons, IoT for All!☆22Updated 9 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆12Updated last week
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆138Updated 3 months ago
- Beer-ISAC Community Resources☆26Updated 4 years ago
- This project will create DJI Tello Drone controller program. It also use the ESP8266 Arduino to read the data from HC-SR04 Ultrasonic Sen…☆11Updated last year
- Security Operation Center Lab☆19Updated 7 months ago
- ☆37Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 8 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 2 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆15Updated 8 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆96Updated this week
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated this week
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 7 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year