Create malware knowledge graphs from analysis reports
☆40Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Knowledge-Graph
Users that are interested in Malware-Knowledge-Graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 3, 2024Updated 2 years ago
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- Open-source antivirus project that leverages artificial intelligence to protect your computer from malware and viruses.☆19Sep 24, 2023Updated 2 years ago
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- GDT (Ghidra Data Type) generated from IDA tils☆22Mar 10, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Patched GDB-Multiarch to debug android Kernels.☆14Jun 29, 2019Updated 6 years ago
- ☆16May 22, 2014Updated 11 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Git+Ansible: watch git repo for changes and run only changed playbooks☆16Jan 23, 2023Updated 3 years ago
- Living off the False Positive!☆42Apr 3, 2026Updated last month
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆26May 31, 2019Updated 6 years ago
- a tiny program to consume from ETW providers for research☆56Jan 4, 2025Updated last year
- ☆31Feb 28, 2025Updated last year
- Kernel-Mode driver and User-Mode application communication project☆12Jun 24, 2018Updated 7 years ago
- If you made it in here I have no clue how, well hi☆14Apr 10, 2022Updated 4 years ago
- ☆12Jul 12, 2022Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Dec 10, 2021Updated 4 years ago
- Not mine, just saved☆13Nov 12, 2023Updated 2 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated last year
- This tool automates and facilitates an AES CBC BitFlip attack☆21Jan 17, 2024Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆163Apr 28, 2026Updated last week
- Disassembler for Zeus VM custom instruction set☆31Feb 12, 2024Updated 2 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 4 years ago
- ☆18Jan 11, 2026Updated 3 months ago
- Rustで作成されたバイナリのリバースエンジニアリング調査レポート☆65Dec 1, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆13Jan 28, 2026Updated 3 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆190Updated this week
- ☆32Oct 1, 2021Updated 4 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆80Dec 16, 2024Updated last year