Xen0ph0n / MIDASView external linksLinks
Metadata Inspection Database Alerting System
☆42Jul 26, 2013Updated 12 years ago
Alternatives and similar repositories for MIDAS
Users that are interested in MIDAS are comparing it to the libraries listed below
Sorting:
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Yaras Random☆23Feb 21, 2019Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 4 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 10 years ago
- Automatic Yara Rule Generation☆333Feb 2, 2016Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- A Python library to emit Sensu events that the Yelp Sensu Handlers can understand for Self-Service Sensu Monitoring☆14Sep 4, 2025Updated 5 months ago