MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆14Feb 13, 2018Updated 8 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- Module to convert Cuckoo .json to .mist☆10Apr 8, 2020Updated 5 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago
- ☆34Apr 12, 2016Updated 9 years ago
- Juniper SRX Firewall Dynamic Address Feeder☆12May 2, 2022Updated 3 years ago
- Digital Identity and Blockchain☆10May 19, 2018Updated 7 years ago
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- Release browser resources by suspending the tabs you aren't using☆11Jan 19, 2022Updated 4 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- A terraform provider for drone.io☆12Jan 21, 2021Updated 5 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- DeepRetinotopy - General toolbox for predicting human retinotopic maps☆20Dec 23, 2025Updated 2 months ago
- Guardicore osqueries collection for asset information, TH and compliance.☆17Dec 22, 2021Updated 4 years ago
- Foreman plugin for integration with External IPAM providers☆12Dec 9, 2020Updated 5 years ago
- Jellyfin metrics exporter for Prometheus monitoring☆19Jun 13, 2023Updated 2 years ago
- Examples of using Consul Connect features in Nomad☆10Feb 22, 2026Updated last week
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Keycloak gatekeeper middleware for traefik☆11Updated this week
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- LDAP provider for Terraform☆13Sep 27, 2023Updated 2 years ago
- The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Plat…☆13Jan 7, 2026Updated last month
- Automated Vulnerability Analysis and Disclosure of Docker Containers☆13Jun 19, 2020Updated 5 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- Centralized Active Directory Auditing Tool☆21Oct 28, 2022Updated 3 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Sample SeaweedFS CSI deployment in Nomad☆11Oct 5, 2021Updated 4 years ago
- Simple server that scrapes NSX-T stats and exports them via HTTP for Prometheus consumption☆10Mar 20, 2023Updated 2 years ago
- Eye state localisation and detection for use in Advanced Driver Assistance System.☆18Jan 25, 2019Updated 7 years ago
- ☆13Jun 20, 2024Updated last year
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Harbor Terraform Provider☆13Oct 27, 2025Updated 4 months ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 7 years ago
- Cribl Environment for learning LogStream☆14Sep 29, 2020Updated 5 years ago