Analysis Correlation Engine
☆23Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for ACE
Users that are interested in ACE are comparing it to the libraries listed below
Sorting:
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 3 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- USB device management to prevent against BadUSB attacks☆24Oct 4, 2014Updated 11 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- An attempt to predict price changes in Runescape using Machine Learning.☆10Aug 28, 2018Updated 7 years ago
- 利用 360 每天公开的 恶意DGA 域名信息 http://data.netlab.360.com/feeds/dga/dga.txt ,通过分析 wireshark 抓到的 pcap文件,去匹配相应的 DNS 请求,试图发现内网受感染的地址☆20May 24, 2018Updated 7 years ago
- Analysis Correlation Engine☆26Sep 8, 2019Updated 6 years ago
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 3 months ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Let's Play Bingo - 2020 Edition☆21Jul 19, 2023Updated 2 years ago
- Code snippets from my Youtube channel https://www.youtube.com/channel/UCJW25d8mW8ciz0DQC-5XNsQ☆17Mar 21, 2021Updated 5 years ago
- Flask File Upload with dropzone.js.☆23Apr 27, 2014Updated 11 years ago
- Live Dangerous Linux Malware Samples!☆22May 5, 2020Updated 5 years ago
- ☆34May 4, 2020Updated 5 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- ☆19Feb 6, 2023Updated 3 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated 2 months ago
- Galvanize: Pure Rust CDB reader/writer☆18Jan 16, 2023Updated 3 years ago
- Store Fly app logs locally.☆13Nov 13, 2022Updated 3 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Web Defacement Detection Tool☆18Sep 24, 2019Updated 6 years ago
- ☆12Apr 10, 2019Updated 6 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Create dozens/hundreds/thousands/millions of random examples based on a pest grammar (PEG). It can be used for generate string/structured…☆15Jun 8, 2021Updated 4 years ago
- Small tutorial example of an AWS Lambda custom runtime in Rust☆10Oct 25, 2020Updated 5 years ago
- Boyer-Moore-MagicLen, a fast string search algorithm implemented in Rust.☆13Dec 13, 2025Updated 3 months ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 5 months ago
- Search algorithms written in Rust☆11Feb 15, 2018Updated 8 years ago