MIST (Malware Instruction Set) is a metalanguage representation for monitored behavior of malicious software. Cuckoo2MIST works by converting Cuckoo Sandbox analysis reports into MIST format for data mining and machine learning.
☆14Feb 13, 2018Updated 8 years ago
Alternatives and similar repositories for Cuckoo2MIST
Users that are interested in Cuckoo2MIST are comparing it to the libraries listed below
Sorting:
- Module to convert Cuckoo .json to .mist☆10Apr 8, 2020Updated 5 years ago
- Simple RISC Machine☆15Apr 29, 2019Updated 6 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago
- Juniper SRX Firewall Dynamic Address Feeder☆12May 2, 2022Updated 3 years ago
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- A Prometheus-format exporter to report on DockerHub per-image rate limits☆11Mar 6, 2026Updated last week
- DeepRetinotopy - General toolbox for predicting human retinotopic maps☆20Updated this week
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- track your food!☆11Feb 8, 2017Updated 9 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Examples of using Consul Connect features in Nomad☆10Mar 8, 2026Updated last week
- Jellyfin metrics exporter for Prometheus monitoring☆19Jun 13, 2023Updated 2 years ago
- A terraform provider for drone.io☆12Jan 21, 2021Updated 5 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- LDAP provider for Terraform☆13Sep 27, 2023Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- UiPath Level 3 - Advanced Training(日本語)課題①☆14Aug 30, 2020Updated 5 years ago
- The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Plat…☆13Jan 7, 2026Updated 2 months ago
- ☆11Mar 27, 2023Updated 2 years ago
- Automated Vulnerability Analysis and Disclosure of Docker Containers☆13Jun 19, 2020Updated 5 years ago
- FlipperZero Bad USB script for loadouts☆10Mar 25, 2024Updated last year
- Keycloak gatekeeper middleware for traefik☆11Updated this week
- Centralized Active Directory Auditing Tool☆21Oct 28, 2022Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Keras Implementation of the continuous control with actor-critic, a3c☆13Dec 3, 2017Updated 8 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- An address search field which helps to autocomplete an address by a reference. It can be used to get Directions beetwen two (or more) poi…☆13Apr 22, 2024Updated last year
- Cribl Environment for learning LogStream☆14Sep 29, 2020Updated 5 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- ☆13Jun 20, 2024Updated last year
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- Sample SeaweedFS CSI deployment in Nomad☆11Oct 5, 2021Updated 4 years ago
- Eye state localisation and detection for use in Advanced Driver Assistance System.☆18Jan 25, 2019Updated 7 years ago
- ☆17Feb 7, 2026Updated last month
- Simple server that scrapes NSX-T stats and exports them via HTTP for Prometheus consumption☆10Mar 20, 2023Updated 2 years ago