Sachavent / doctolib-pullerView external linksLinks
☆11May 14, 2021Updated 4 years ago
Alternatives and similar repositories for doctolib-puller
Users that are interested in doctolib-puller are comparing it to the libraries listed below
Sorting:
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 weeks ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- ☆10Aug 9, 2024Updated last year
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆12Jun 6, 2024Updated last year
- Yara sort☆13Updated this week
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Go bindings for YARA☆14Aug 24, 2025Updated 5 months ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Summarize CTI reports with OpenAI☆17Feb 2, 2026Updated last week
- ojjson is a library designed to facilitate JSON interactions with Ollama, a large language api (LLM). It leverages the power of Zod for s…☆12Nov 7, 2024Updated last year
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- IMRPOVED simple vector database made in numpy☆14Jun 2, 2024Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Jan 24, 2024Updated 2 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 3 months ago
- Collection of Study Material for SANS - FOR610☆18Jul 31, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- In this repository, you will discover how Streamlit, a Python framework for developing interactive data applications, can work seamlessly…☆18Sep 18, 2023Updated 2 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Ransomware Chat Simulation☆21Mar 18, 2025Updated 10 months ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆12May 28, 2021Updated 4 years ago
- ☆23Mar 17, 2024Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- ☆21Nov 19, 2025Updated 2 months ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- trace sample collection for lots of telco protocols☆16Nov 11, 2014Updated 11 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Jun 11, 2025Updated 8 months ago
- Faster version of `symchk /om` for generating PDB manifests of offline machines☆19Apr 18, 2021Updated 4 years ago