M-Gregoire / Cuckoo2MistView external linksLinks
Module to convert Cuckoo .json to .mist
☆10Apr 8, 2020Updated 5 years ago
Alternatives and similar repositories for Cuckoo2Mist
Users that are interested in Cuckoo2Mist are comparing it to the libraries listed below
Sorting:
- Eye state localisation and detection for use in Advanced Driver Assistance System.☆18Jan 25, 2019Updated 7 years ago
- MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by conver…☆14Feb 13, 2018Updated 8 years ago
- Simple RISC Machine☆15Apr 29, 2019Updated 6 years ago
- HASS.IO repository☆12Jul 7, 2025Updated 7 months ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- DeepRetinotopy - General toolbox for predicting human retinotopic maps☆17Dec 23, 2025Updated last month
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- Release browser resources by suspending the tabs you aren't using☆11Jan 19, 2022Updated 4 years ago
- Juniper SRX Firewall Dynamic Address Feeder☆12May 2, 2022Updated 3 years ago
- Jellyfin metrics exporter for Prometheus monitoring☆18Jun 13, 2023Updated 2 years ago
- Guardicore osqueries collection for asset information, TH and compliance.☆16Dec 22, 2021Updated 4 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- ☆14Sep 20, 2023Updated 2 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Foreman plugin for integration with External IPAM providers☆12Dec 9, 2020Updated 5 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Examples of using Consul Connect features in Nomad☆10Jan 26, 2026Updated 2 weeks ago
- A terraform provider for drone.io☆12Jan 21, 2021Updated 5 years ago
- Best practice configuration for Linux auditd for CIS and STIG standards, enhanced with LOTL detection rules.☆14Dec 6, 2025Updated 2 months ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- Large Language Models for Software Engineering: A Systematic Literature Review☆18Sep 19, 2024Updated last year
- A Prometheus-format exporter to report on DockerHub per-image rate limits☆11Updated this week
- Launch a fresh docker container per SSH connection☆50Oct 18, 2023Updated 2 years ago
- Automated Vulnerability Analysis and Disclosure of Docker Containers☆13Jun 19, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Plat…☆13Jan 7, 2026Updated last month
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- LDAP provider for Terraform☆13Sep 27, 2023Updated 2 years ago
- Keycloak gatekeeper middleware for traefik☆11Updated this week
- FlipperZero Bad USB script for loadouts☆10Mar 25, 2024Updated last year
- LightDM greeter that uses webkit2 for theming via HTML/JavaScript☆11Dec 23, 2019Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- ☆13Jan 12, 2026Updated last month
- Description and configuration of my infrastructure: Computers, Phone, Servers and 3D printer.☆16Feb 5, 2026Updated last week
- A Prometheus parsing and line generation library☆15Dec 12, 2025Updated 2 months ago