☆13Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for Static-Dynamic-Malware-Analysis
Users that are interested in Static-Dynamic-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- ☆17Jan 21, 2026Updated last month
- Repository resource for threat hunter☆158Sep 14, 2018Updated 7 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- 22-23-24 Temmuz 2022 Tarihinde yapılan Siber Güvenlik Eğitimlerine Ait Dökümanlar☆31Jan 19, 2026Updated last month
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆12Jan 28, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆10Jul 8, 2024Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- ☆10Feb 20, 2026Updated last week
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆14Dec 6, 2023Updated 2 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- Bitcoin address changer. It changes the clipboard depending of the pubkey.☆10Sep 12, 2021Updated 4 years ago
- WireGuard client for PacketFence ZTNA☆11Apr 26, 2021Updated 4 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 2 years ago
- A Credit Card Payment System - CCPS build with react, typescript, bootstrap, sass, react-transition, font-awesome☆11Mar 25, 2022Updated 3 years ago
- find an unconfirmed transaction you like and fire up my app. Input your Wallet address when prompted to and warch the tx be rerouted to y…☆12May 8, 2020Updated 5 years ago
- Recordization library☆11Updated this week
- A script to access someone's webcam by sharing a link.☆10May 3, 2020Updated 5 years ago
- Sécurité informatique pratique à travers Python (cours de l'ESGI)☆17Mar 7, 2020Updated 5 years ago
- a simple linux kernel module rootkit work on linux kernel 5.19☆16Dec 6, 2023Updated 2 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆22Feb 2, 2026Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago